<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2012-08-30T04:04:57</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20011267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2001-1267</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2001-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1267" source="CVE"/>
	<description>
	Unknown.
	</description>
 </metadata>
<!-- 2506227b7bd914b11632b5701384104a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030401" comment="tar less than 1.13.25-325.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20020399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-0399</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2002-0399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399" source="CVE"/>
	<description>
	Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leaves the "..", a variant of CVE-2001-1267.ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype.SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.Buffer overflow in X11 dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code while Ethereal is parsing keysyms.DNS dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet that causes Ethereal to enter an infinite loop.Vulnerability in GIOP dissector in Ethereal before 0.9.3 allows remote attackers to cause a denial of service (memory consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2506227b7bd914b11632b5701384104a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030401" comment="tar less than 1.13.25-325.10"/>
	</criteria>
	<!-- cffcc0146fa6ba2fd6d7036a5d1643b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030402" comment="tar less than 1.13.25-325.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20030020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-0020</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2003-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0020" source="CVE"/>
	<description>
	Unknown.
	</description>
 </metadata>
<!-- 26c3e83f9771093dfc1fecccbe79c9fe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032404" comment="apache2-devel less than 2.0.59-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032405" comment="apache2-doc less than 2.0.59-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032406" comment="apache2-example-pages less than 2.0.59-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032407" comment="apache2-prefork less than 2.0.59-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032408" comment="apache2-worker less than 2.0.59-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032409" comment="apache2 less than 2.0.59-1.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030403" comment="libapr0 less than 2.0.59-1.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20030190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-0190</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2003-0190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0190" source="CVE"/>
	<description>
	OpenSSH-portable (OpenSSH) 3.6.1p1 and earlier with PAM support enabled immediately sends an error message when a user does not exist, which allows remote attackers to determine valid usernames via a timing attack.
	</description>
 </metadata>
<!-- 752421e658dda743b9500849b697497d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030404" comment="openssh less than 3.8p1-37.17"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20030856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2003-0856</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2003-0856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0856" source="CVE"/>
	<description>
	iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the kernel netlink interface.
	</description>
 </metadata>
<!-- 9874b4d93537973f551c3a967fce6726 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030405" comment="iproute2 less than 2.4.7-866.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0110</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0110" source="CVE"/>
	<description>
	Buffer overflow in the (1) nanohttp or (2) nanoftp modules in XMLSoft Libxml 2 (Libxml2) 2.6.0 through 2.6.5 allow remote attackers to execute arbitrary code via a long URL.gdk-pixbuf before 0.20 allows attackers to cause a denial of service (crash) via a malformed bitmap (BMP) file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 969e1829d7e212fea47d4cf82da0bb2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032410" comment="libxml2-32bit less than 9-200412202049"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032411" comment="libxml2-32bit less than 9-200412202205"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032412" comment="libxml2-64bit less than 9-200412202113"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030406" comment="libxml2-devel less than 2.6.7-28.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032413" comment="libxml2-x86 less than 9-200412202214"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030407" comment="libxml2 less than 2.6.7-28.7"/>
		</criteria>
	</criteria>
	<!-- ebcaf61f6debd12131a1753d095345dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032414" comment="libxml-32bit less than 9-200412202049"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032415" comment="libxml-32bit less than 9-200412202205"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032416" comment="libxml-64bit less than 9-200412202113"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030409" comment="libxml-devel less than 1.8.17-366.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032417" comment="libxml-x86 less than 9-200412202214"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030410" comment="libxml less than 1.8.17-366.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0452</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452" source="CVE"/>
	<description>
	Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
	</description>
 </metadata>
<!-- 7e6cf48cf7a796f79176269c2c18b8df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032418" comment="perl-32bit less than 9-200502051955"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032419" comment="perl-32bit less than 9-200502060348"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032420" comment="perl-64bit less than 9-200502060420"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032421" comment="perl-x86 less than 9-200502051945"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030411" comment="perl less than 5.8.3-32.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0457</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0457" source="CVE"/>
	<description>
	The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files.
	</description>
 </metadata>
<!-- 42f8c8e60d600a62b2fa48ac529c929a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032422" comment="mysql less than 4.0.18-32.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0494</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0494" source="CVE"/>
	<description>
	Multiple extfs backend scripts for GNOME virtual file system (VFS) before 1.0.1 may allow remote attackers to perform certain unauthorized actions via a gnome-vfs URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 50802e51d74cd2da860a412b1f03a9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032423" comment="mc less than 4.6.0-324.7"/>
	</criteria>
	<!-- 6e8b9da54a654fd68b754c2b999808d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032424" comment="gnome-vfs less than 1.0.5-806.7"/>
	</criteria>
	<!-- a9b2b8c3a049831dfe42a9cc69112c52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032425" comment="gnome-vfs2-32bit less than 9-200504131658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032426" comment="gnome-vfs2-32bit less than 9-200504132031"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032427" comment="gnome-vfs2-64bit less than 9-200504131529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032428" comment="gnome-vfs2-doc less than 2.4.2-68.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032429" comment="gnome-vfs2 less than 2.4.2-68.9"/>
		</criteria>
	</criteria>
	<!-- bdd3b754fc83ccf00b43592ca115175a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032430" comment="gnome-vfs less than 1.0.5-806.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0504</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0504" source="CVE"/>
	<description>
	Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients.
	</description>
 </metadata>
<!-- 0d593232af7f97e396db01b012979d6f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032431" comment="ethereal less than 0.10.3-15.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0505</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0505" source="CVE"/>
	<description>
	The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors.
	</description>
 </metadata>
<!-- 0d593232af7f97e396db01b012979d6f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032431" comment="ethereal less than 0.10.3-15.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0506</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0506" source="CVE"/>
	<description>
	The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference.
	</description>
 </metadata>
<!-- 0d593232af7f97e396db01b012979d6f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032431" comment="ethereal less than 0.10.3-15.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0507</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0507" source="CVE"/>
	<description>
	Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- 0d593232af7f97e396db01b012979d6f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032431" comment="ethereal less than 0.10.3-15.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0558</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0558" source="CVE"/>
	<description>
	The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang) via a certain UDP packet to the IPP port.
	</description>
 </metadata>
<!-- c5b0b422e8d7e48a178aced6fe723b75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032432" comment="cups-client less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032433" comment="cups-devel less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032434" comment="cups-libs-32bit less than 9-200408311758"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032435" comment="cups-libs-32bit less than 9-200408311952"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032436" comment="cups-libs-64bit less than 9-200408312018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032437" comment="cups-libs-x86 less than 9-200408311747"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032438" comment="cups-libs less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032439" comment="cups less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032440" comment="foomatic-filters less than 3.0.1-41.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0597</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0597" source="CVE"/>
	<description>
	Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
	</description>
 </metadata>
<!-- d4c82e8ce1131422a26739977059cd46 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032441" comment="libpng-32bit less than 9-200407192204"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032442" comment="libpng-32bit less than 9-200407192329"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032443" comment="libpng-64bit less than 9-200407211228"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032444" comment="libpng-x86 less than 9-200407192328"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032445" comment="libpng less than 1.2.5-182.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0598</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0598" source="CVE"/>
	<description>
	The png_handle_iCCP function in libpng 1.2.5 and earlier allows remote attackers to cause a denial of service (application crash) via a certain PNG image that triggers a null dereference.
	</description>
 </metadata>
<!-- d4c82e8ce1131422a26739977059cd46 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032441" comment="libpng-32bit less than 9-200407192204"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032442" comment="libpng-32bit less than 9-200407192329"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032443" comment="libpng-64bit less than 9-200407211228"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032444" comment="libpng-x86 less than 9-200407192328"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032445" comment="libpng less than 1.2.5-182.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0599</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0599" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) png_read_png in pngread.c or (2) png_handle_sPLT functions in pngrutil.c or (3) progressive display image reading capability in libpng 1.2.5 and earlier allow remote attackers to cause a denial of service (application crash) via a malformed PNG image.
	</description>
 </metadata>
<!-- d4c82e8ce1131422a26739977059cd46 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032441" comment="libpng-32bit less than 9-200407192204"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032442" comment="libpng-32bit less than 9-200407192329"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032443" comment="libpng-64bit less than 9-200407211228"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032444" comment="libpng-x86 less than 9-200407192328"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032445" comment="libpng less than 1.2.5-182.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0600</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0600" source="CVE"/>
	<description>
	Buffer overflow in the Samba Web Administration Tool (SWAT) in Samba 3.0.2 to 3.0.4 allows remote attackers to execute arbitrary code via an invalid base-64 character during HTTP basic authentication.
	</description>
 </metadata>
<!-- 9ceab98ac3fc612da6b2a294ba2c43c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032446" comment="libsmbclient-32bit less than 9-200407211117"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032447" comment="libsmbclient-32bit less than 9-200407211155"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032448" comment="libsmbclient-64bit less than 9-200407211228"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032449" comment="libsmbclient-devel less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032450" comment="libsmbclient less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032451" comment="samba-client less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032452" comment="samba-pdb less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032453" comment="samba-python less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032454" comment="samba-winbind less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032455" comment="samba less than 3.0.4-1.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0630</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0630" source="CVE"/>
	<description>
	The uudecoding feature in Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via shell metacharacters ("`" or backtick) in the filename of the PDF file that is provided to the uudecode command.
	</description>
 </metadata>
<!-- 22f606e0a125a66339787ef7b45e6387 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032456" comment="acroread less than 5.09-4.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0631</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0631" source="CVE"/>
	<description>
	Buffer overflow in the uudecoding feature for Adobe Acrobat Reader 5.0.5 and 5.0.6 for Unix and Linux, and possibly other versions including those before 5.0.9, allows remote attackers to execute arbitrary code via a long filename for the PDF file that is provided to the uudecode command.
	</description>
 </metadata>
<!-- 22f606e0a125a66339787ef7b45e6387 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032456" comment="acroread less than 5.09-4.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0633</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0633" source="CVE"/>
	<description>
	The iSNS dissector for Ethereal 0.10.3 through 0.10.4 allows remote attackers to cause a denial of service (process abort) via an integer overflow.
	</description>
 </metadata>
<!-- 05f602a488b931557571a0a726de1aed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032457" comment="ethereal less than 0.10.3-15.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0634</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0634" source="CVE"/>
	<description>
	The SMB SID snooping capability in Ethereal 0.9.15 to 0.10.4 allows remote attackers to cause a denial of service (process crash) via a handle without a policy name, which causes a null dereference.
	</description>
 </metadata>
<!-- 05f602a488b931557571a0a726de1aed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032457" comment="ethereal less than 0.10.3-15.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0635</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0635" source="CVE"/>
	<description>
	The SNMP dissector in Ethereal 0.8.15 through 0.10.4 allows remote attackers to cause a denial of service (process crash) via a (1) malformed or (2) missing community string, which causes an out-of-bounds read.
	</description>
 </metadata>
<!-- 05f602a488b931557571a0a726de1aed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032457" comment="ethereal less than 0.10.3-15.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0656</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0656" source="CVE"/>
	<description>
	The accept_client function in PureFTPd 1.0.18 and earlier allows remote attackers to cause a denial of service by exceeding the maximum number of connections.
	</description>
 </metadata>
<!-- 751d49dd2256184e10d64ee814ad9b7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032458" comment="pure-ftpd less than 1.0.18-39.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0686</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0686" source="CVE"/>
	<description>
	Buffer overflow in Samba 2.2.x to 2.2.9, and 3.0.0 to 3.0.4, when the "mangling method = hash" option is enabled in smb.conf, has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 9ceab98ac3fc612da6b2a294ba2c43c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032446" comment="libsmbclient-32bit less than 9-200407211117"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032447" comment="libsmbclient-32bit less than 9-200407211155"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032448" comment="libsmbclient-64bit less than 9-200407211228"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032449" comment="libsmbclient-devel less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032450" comment="libsmbclient less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032451" comment="samba-client less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032452" comment="samba-pdb less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032453" comment="samba-python less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032454" comment="samba-winbind less than 3.0.4-1.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032455" comment="samba less than 3.0.4-1.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0687</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0687" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1c6cfc49def629c55e85e6a51eb19b44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032459" comment="openmotif-devel-32bit less than 9-200410031617"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032460" comment="openmotif-devel-32bit less than 9-200410031928"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032461" comment="openmotif-devel-64bit less than 9-200410031619"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032462" comment="openmotif-devel less than 2.2.2-519.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032463" comment="openmotif less than 2.2.2-519.4"/>
		</criteria>
	</criteria>
	<!-- 5fc836c604fb00d163180bddb1be43c2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032464" comment="XFree86-libs-32bit less than 9-200411100109"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032465" comment="XFree86-libs-32bit less than 9-200411100704"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032466" comment="XFree86-libs-64bit less than 9-200411100528"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032467" comment="XFree86-libs-x86 less than 9-200411100318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030415" comment="XFree86-libs less than 4.3.99.902-43.35.3"/>
		</criteria>
	</criteria>
	<!-- 99f082dd483ac0d81aa4ef9a2301d420 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032468" comment="openmotif-devel-32bit less than 9-200410081851"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032469" comment="openmotif-devel-32bit less than 9-200410082201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032470" comment="openmotif-devel-64bit less than 9-200410082105"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032462" comment="openmotif-devel less than 2.2.2-519.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032471" comment="openmotif-libs-32bit less than 9-200410081851"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032472" comment="openmotif-libs-32bit less than 9-200410082201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032473" comment="openmotif-libs-64bit less than 9-200410082105"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032474" comment="openmotif-libs less than 2.2.2-519.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032463" comment="openmotif less than 2.2.2-519.4"/>
		</criteria>
	</criteria>
	<!-- b56c5555fff84ee828ea63a9bb9542f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032475" comment="openmotif21-libs less than 2.1.30MLI4-119.4"/>
	</criteria>
	<!-- ed9788410744ec97483978da5304464c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032476" comment="XFree86-libs-32bit less than 9-200409151952"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032477" comment="XFree86-libs-32bit less than 9-200409161634"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032478" comment="XFree86-libs-64bit less than 9-200409152030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032479" comment="XFree86-libs-x86 less than 9-200409152035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032480" comment="XFree86-libs less than 4.3.99.902-43.31"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0688</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0688" source="CVE"/>
	<description>
	Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1c6cfc49def629c55e85e6a51eb19b44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032459" comment="openmotif-devel-32bit less than 9-200410031617"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032460" comment="openmotif-devel-32bit less than 9-200410031928"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032461" comment="openmotif-devel-64bit less than 9-200410031619"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032462" comment="openmotif-devel less than 2.2.2-519.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032463" comment="openmotif less than 2.2.2-519.4"/>
		</criteria>
	</criteria>
	<!-- 5fc836c604fb00d163180bddb1be43c2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032464" comment="XFree86-libs-32bit less than 9-200411100109"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032465" comment="XFree86-libs-32bit less than 9-200411100704"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032466" comment="XFree86-libs-64bit less than 9-200411100528"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032467" comment="XFree86-libs-x86 less than 9-200411100318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030415" comment="XFree86-libs less than 4.3.99.902-43.35.3"/>
		</criteria>
	</criteria>
	<!-- 99f082dd483ac0d81aa4ef9a2301d420 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032468" comment="openmotif-devel-32bit less than 9-200410081851"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032469" comment="openmotif-devel-32bit less than 9-200410082201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032470" comment="openmotif-devel-64bit less than 9-200410082105"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032462" comment="openmotif-devel less than 2.2.2-519.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032471" comment="openmotif-libs-32bit less than 9-200410081851"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032472" comment="openmotif-libs-32bit less than 9-200410082201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032473" comment="openmotif-libs-64bit less than 9-200410082105"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032474" comment="openmotif-libs less than 2.2.2-519.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032463" comment="openmotif less than 2.2.2-519.4"/>
		</criteria>
	</criteria>
	<!-- b56c5555fff84ee828ea63a9bb9542f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032475" comment="openmotif21-libs less than 2.1.30MLI4-119.4"/>
	</criteria>
	<!-- ed9788410744ec97483978da5304464c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032476" comment="XFree86-libs-32bit less than 9-200409151952"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032477" comment="XFree86-libs-32bit less than 9-200409161634"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032478" comment="XFree86-libs-64bit less than 9-200409152030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032479" comment="XFree86-libs-x86 less than 9-200409152035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032480" comment="XFree86-libs less than 4.3.99.902-43.31"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0689</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0689" source="CVE"/>
	<description>
	KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow local users to create or truncate arbitrary files.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 42f8300d963a93c070593dc30187984d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032481" comment="arts-32bit less than 9-200407271038"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032482" comment="arts-32bit less than 9-200407271118"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032483" comment="arts-64bit less than 9-200407271122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032484" comment="arts-x86 less than 9-200407271036"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032485" comment="arts less than 1.2.1-35.4"/>
		</criteria>
	</criteria>
	<!-- a809b3e4737da5a6229cd188189ac882 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032486" comment="kdebase3-32bit less than 9-200408111036"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032487" comment="kdebase3-32bit less than 9-200408111119"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032488" comment="kdebase3-64bit less than 9-200408111051"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032489" comment="kdebase3-devel less than 3.2.1-68.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032490" comment="kdebase3-x86 less than 9-200408111026"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032491" comment="kdebase3 less than 3.2.1-68.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032492" comment="kdelibs3-32bit less than 9-200408111036"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032493" comment="kdelibs3-32bit less than 9-200408111119"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032494" comment="kdelibs3-64bit less than 9-200408111051"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032495" comment="kdelibs3-devel less than 3.2.1-44.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032496" comment="kdelibs3-x86 less than 9-200408111026"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032497" comment="kdelibs3 less than 3.2.1-44.28"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0690</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0690" source="CVE"/>
	<description>
	The DCOPServer in KDE 3.2.3 and earlier allows local users to gain unauthorized access via a symlink attack on DCOP files in the /tmp directory.
	</description>
 </metadata>
<!-- a809b3e4737da5a6229cd188189ac882 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032486" comment="kdebase3-32bit less than 9-200408111036"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032487" comment="kdebase3-32bit less than 9-200408111119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032488" comment="kdebase3-64bit less than 9-200408111051"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032489" comment="kdebase3-devel less than 3.2.1-68.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032490" comment="kdebase3-x86 less than 9-200408111026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032491" comment="kdebase3 less than 3.2.1-68.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032492" comment="kdelibs3-32bit less than 9-200408111036"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032493" comment="kdelibs3-32bit less than 9-200408111119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032494" comment="kdelibs3-64bit less than 9-200408111051"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032495" comment="kdelibs3-devel less than 3.2.1-44.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032496" comment="kdelibs3-x86 less than 9-200408111026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032497" comment="kdelibs3 less than 3.2.1-44.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0691</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691" source="CVE"/>
	<description>
	Heap-based buffer overflow in the BMP image format parser for the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- 7160028389ea9570ffc42c1680285524 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032498" comment="qt3-32bit less than 9-200408140621"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032499" comment="qt3-32bit less than 9-200408162047"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032500" comment="qt3-64bit less than 9-200408140912"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032501" comment="qt3-non-mt less than 3.3.1-41.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032502" comment="qt3-x86 less than 9-200408140621"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032503" comment="qt3 less than 3.3.1-36.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0692</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0692" source="CVE"/>
	<description>
	The XPM parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0693.
	</description>
 </metadata>
<!-- 7160028389ea9570ffc42c1680285524 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032498" comment="qt3-32bit less than 9-200408140621"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032499" comment="qt3-32bit less than 9-200408162047"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032500" comment="qt3-64bit less than 9-200408140912"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032501" comment="qt3-non-mt less than 3.3.1-41.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032502" comment="qt3-x86 less than 9-200408140621"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032503" comment="qt3 less than 3.3.1-36.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0693</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693" source="CVE"/>
	<description>
	The GIF parser in the QT library (qt3) before 3.3.3 allows remote attackers to cause a denial of service (application crash) via a malformed image file that triggers a null dereference, a different vulnerability than CVE-2004-0692.
	</description>
 </metadata>
<!-- 7160028389ea9570ffc42c1680285524 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032498" comment="qt3-32bit less than 9-200408140621"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032499" comment="qt3-32bit less than 9-200408162047"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032500" comment="qt3-64bit less than 9-200408140912"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032501" comment="qt3-non-mt less than 3.3.1-41.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032502" comment="qt3-x86 less than 9-200408140621"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032503" comment="qt3 less than 3.3.1-36.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0700</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0700" source="CVE"/>
	<description>
	Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
	</description>
 </metadata>
<!-- 399e6143dd24f98aa9a5a8884441c94f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032504" comment="mod_ssl less than 2.8.16-71.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0718</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0718" source="CVE"/>
	<description>
	The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0721</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0721" source="CVE"/>
	<description>
	Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
	</description>
 </metadata>
<!-- a809b3e4737da5a6229cd188189ac882 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032486" comment="kdebase3-32bit less than 9-200408111036"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032487" comment="kdebase3-32bit less than 9-200408111119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032488" comment="kdebase3-64bit less than 9-200408111051"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032489" comment="kdebase3-devel less than 3.2.1-68.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032490" comment="kdebase3-x86 less than 9-200408111026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032491" comment="kdebase3 less than 3.2.1-68.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032492" comment="kdelibs3-32bit less than 9-200408111036"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032493" comment="kdelibs3-32bit less than 9-200408111119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032494" comment="kdelibs3-64bit less than 9-200408111051"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032495" comment="kdelibs3-devel less than 3.2.1-44.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032496" comment="kdelibs3-x86 less than 9-200408111026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032497" comment="kdelibs3 less than 3.2.1-44.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0722</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0722" source="CVE"/>
	<description>
	Integer overflow in the SOAPParameter object constructor in (1) Netscape version 7.0 and 7.1 and (2) Mozilla 1.6, and possibly earlier versions, allows remote attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0747</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0747" source="CVE"/>
	<description>
	Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.
	</description>
 </metadata>
<!-- 4b948dfd213097ce95334628f694ce89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032511" comment="apache2-devel less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032512" comment="apache2-doc less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032513" comment="apache2-example-pages less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032514" comment="apache2-prefork less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032515" comment="apache2-worker less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032516" comment="apache2 less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032517" comment="libapr0 less than 2.0.49-27.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0748</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0748" source="CVE"/>
	<description>
	mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (CPU consumption) by aborting an SSL connection in a way that causes an Apache child process to enter an infinite loop.
	</description>
 </metadata>
<!-- b5c9d8218b0d72e7090d96c19ca7c6a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032518" comment="apache2-devel less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032519" comment="apache2-doc less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032520" comment="apache2-example-pages less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032521" comment="apache2-prefork less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032522" comment="apache2-worker less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032523" comment="apache2 less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032524" comment="libapr0 less than 2.0.49-27.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0751</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0751" source="CVE"/>
	<description>
	The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).
	</description>
 </metadata>
<!-- b5c9d8218b0d72e7090d96c19ca7c6a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032518" comment="apache2-devel less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032519" comment="apache2-doc less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032520" comment="apache2-example-pages less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032521" comment="apache2-prefork less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032522" comment="apache2-worker less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032523" comment="apache2 less than 2.0.49-27.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032524" comment="libapr0 less than 2.0.49-27.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0757</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0757" source="CVE"/>
	<description>
	Heap-based buffer overflow in the SendUidl in the POP3 capability for Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, may allow remote POP3 mail servers to execute arbitrary code.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0758</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0758" source="CVE"/>
	<description>
	Mozilla 1.5 through 1.7 allows a CA certificate to be imported even when their DN is the same as that of the built-in CA root certificate, which allows remote attackers to cause a denial of service to SSL pages because the malicious certificate is treated as invalid.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0759</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0759" source="CVE"/>
	<description>
	Mozilla before 1.7 allows remote web servers to read arbitrary files via Javascript that sets the value of an &lt;input type="file"&gt; tag.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0760</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0760" source="CVE"/>
	<description>
	Mozilla allows remote attackers to cause Mozilla to open a URI as a different MIME type than expected via a null character (%00) in an FTP URI.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0761</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0761" source="CVE"/>
	<description>
	Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote attackers to use certain redirect sequences to spoof the security lock icon that makes a web page appear to be encrypted.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0762</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0762" source="CVE"/>
	<description>
	Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to install arbitrary extensions by using interactive events to manipulate the XPInstall Security dialog box.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0763</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0763" source="CVE"/>
	<description>
	Mozilla Firefox 0.9.1 and 0.9.2 allows remote web sites to spoof certificates of trusted web sites via redirects and Javascript that uses the "onunload" method.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0764</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0764" source="CVE"/>
	<description>
	Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, allow remote web sites to hijack the user interface via the "chrome" flag and XML User Interface Language (XUL) files.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0765</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0765" source="CVE"/>
	<description>
	The cert_TestHostName function in Mozilla before 1.7, Firefox before 0.9, and Thunderbird before 0.7, only checks the hostname portion of a certificate when the hostname portion of the URI is not a fully qualified domain name (FQDN), which allows remote attackers to spoof trusted certificates.
	</description>
 </metadata>
<!-- 2d193d1b6d19554bdd0ce86aa3f0b6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032505" comment="mozilla-calendar less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032506" comment="mozilla-dom-inspector less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032507" comment="mozilla-irc less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032508" comment="mozilla-mail less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032509" comment="mozilla-venkman less than 1.6-74.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032510" comment="mozilla less than 1.6-74.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0771</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0771" source="CVE"/>
	<description>
	Buffer overflow in the extract_one function from lhext.c in LHA may allow attackers to execute arbitrary code via a long w (working directory) command line option, a different issue than CVE-2004-0769. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.
	</description>
 </metadata>
<!-- 7f3a31a9eb65a1e9e6f6aa767456f053 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032525" comment="lha less than 1.14i-547.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0782</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782" source="CVE"/>
	<description>
	Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a88bd86017430297e8ec94b3b6fc08c0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032526" comment="gdk-pixbuf-devel less than 0.22.0-62.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032527" comment="gdk-pixbuf-x86 less than 9-200409091658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032528" comment="gdk-pixbuf less than 0.22.0-62.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032529" comment="gtk2-32bit less than 9-200409091701"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032530" comment="gtk2-32bit less than 9-200409091710"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032531" comment="gtk2-64bit less than 9-200409091646"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032532" comment="gtk2-devel less than 2.2.4-125.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032533" comment="gtk2-x86 less than 9-200409091658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032534" comment="gtk2 less than 2.2.4-125.4"/>
		</criteria>
	</criteria>
	<!-- d4c218b07f2ba5480d160398f502100d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032535" comment="gdk-pixbuf-devel less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032536" comment="gdk-pixbuf-devel less than 0.22.0-62.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032537" comment="gdk-pixbuf-gnome less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032538" comment="gdk-pixbuf-gnome less than 0.22.0-62.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032539" comment="gdk-pixbuf-x86 less than 9-200409161502"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032540" comment="gdk-pixbuf less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032541" comment="gdk-pixbuf less than 0.22.0-62.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0783</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0783" source="CVE"/>
	<description>
	Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a88bd86017430297e8ec94b3b6fc08c0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032526" comment="gdk-pixbuf-devel less than 0.22.0-62.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032527" comment="gdk-pixbuf-x86 less than 9-200409091658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032528" comment="gdk-pixbuf less than 0.22.0-62.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032529" comment="gtk2-32bit less than 9-200409091701"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032530" comment="gtk2-32bit less than 9-200409091710"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032531" comment="gtk2-64bit less than 9-200409091646"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032532" comment="gtk2-devel less than 2.2.4-125.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032533" comment="gtk2-x86 less than 9-200409091658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032534" comment="gtk2 less than 2.2.4-125.4"/>
		</criteria>
	</criteria>
	<!-- d4c218b07f2ba5480d160398f502100d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032535" comment="gdk-pixbuf-devel less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032536" comment="gdk-pixbuf-devel less than 0.22.0-62.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032537" comment="gdk-pixbuf-gnome less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032538" comment="gdk-pixbuf-gnome less than 0.22.0-62.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032539" comment="gdk-pixbuf-x86 less than 9-200409161502"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032540" comment="gdk-pixbuf less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032541" comment="gdk-pixbuf less than 0.22.0-62.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0786</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0786" source="CVE"/>
	<description>
	The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.
	</description>
 </metadata>
<!-- 4b948dfd213097ce95334628f694ce89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032511" comment="apache2-devel less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032512" comment="apache2-doc less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032513" comment="apache2-example-pages less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032514" comment="apache2-prefork less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032515" comment="apache2-worker less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032516" comment="apache2 less than 2.0.49-27.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032517" comment="libapr0 less than 2.0.49-27.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0788</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788" source="CVE"/>
	<description>
	Integer overflow in the ICO image decoder for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted ICO file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a88bd86017430297e8ec94b3b6fc08c0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032526" comment="gdk-pixbuf-devel less than 0.22.0-62.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032527" comment="gdk-pixbuf-x86 less than 9-200409091658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032528" comment="gdk-pixbuf less than 0.22.0-62.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032529" comment="gtk2-32bit less than 9-200409091701"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032530" comment="gtk2-32bit less than 9-200409091710"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032531" comment="gtk2-64bit less than 9-200409091646"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032532" comment="gtk2-devel less than 2.2.4-125.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032533" comment="gtk2-x86 less than 9-200409091658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032534" comment="gtk2 less than 2.2.4-125.4"/>
		</criteria>
	</criteria>
	<!-- d4c218b07f2ba5480d160398f502100d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032535" comment="gdk-pixbuf-devel less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032536" comment="gdk-pixbuf-devel less than 0.22.0-62.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032537" comment="gdk-pixbuf-gnome less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032538" comment="gdk-pixbuf-gnome less than 0.22.0-62.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032539" comment="gdk-pixbuf-x86 less than 9-200409161502"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032540" comment="gdk-pixbuf less than 0.22.0-62.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032541" comment="gdk-pixbuf less than 0.22.0-62.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0792</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0792" source="CVE"/>
	<description>
	Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is disabled, allows attackers to read or write certain files.
	</description>
 </metadata>
<!-- d1f93e35e0176de4888068920508db5c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032542" comment="rsync less than 2.6.2-8.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0794</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0794" source="CVE"/>
	<description>
	Multiple signal handler race conditions in lukemftpd (aka tnftpd before 20040810) allow remote authenticated attackers to cause a denial of service or execute arbitrary code.
	</description>
 </metadata>
<!-- 7df81d0a15082ec207c50ddd280d8b3a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032543" comment="heimdal less than 0.6.1rc3-55.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0796</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0796" source="CVE"/>
	<description>
	SpamAssassin 2.5x, and 2.6x before 2.64, allows remote attackers to cause a denial of service via certain malformed messages.
	</description>
 </metadata>
<!-- 873ec41d78d87e273acb6d24152cae23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032544" comment="spamassassin less than 2.64-3.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0801</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801" source="CVE"/>
	<description>
	Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
	</description>
 </metadata>
<!-- c5b0b422e8d7e48a178aced6fe723b75 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032432" comment="cups-client less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032433" comment="cups-devel less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032434" comment="cups-libs-32bit less than 9-200408311758"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032435" comment="cups-libs-32bit less than 9-200408311952"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032436" comment="cups-libs-64bit less than 9-200408312018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032437" comment="cups-libs-x86 less than 9-200408311747"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032438" comment="cups-libs less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032439" comment="cups less than 1.1.20-108.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032440" comment="foomatic-filters less than 3.0.1-41.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0803</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0803" source="CVE"/>
	<description>
	Multiple vulnerabilities in the RLE (run length encoding) decoders for libtiff 3.6.1 and earlier, related to buffer overflows and integer overflows, allow remote attackers to execute arbitrary code via TIFF files.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b041aa0ff3776ef001f5ef9590ac9bd6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030416" comment="kdegraphics3-fax less than 3.2.1-67.12"/>
	</criteria>
	<!-- b96ddd23c856292e6f2d3271d511b86b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032545" comment="libtiff-32bit less than 9-200410202150"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032546" comment="libtiff-32bit less than 9-200410212027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032547" comment="libtiff-64bit less than 9-200410210007"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032548" comment="libtiff-x86 less than 9-200410202139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032549" comment="libtiff less than 3.6.1-38.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0804</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0804" source="CVE"/>
	<description>
	Vulnerability in tif_dirread.c for libtiff allows remote attackers to cause a denial of service (application crash) via a TIFF image that causes a divide-by-zero error when the number of row bytes is zero, a different vulnerability than CVE-2005-2452.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b041aa0ff3776ef001f5ef9590ac9bd6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030416" comment="kdegraphics3-fax less than 3.2.1-67.12"/>
	</criteria>
	<!-- b96ddd23c856292e6f2d3271d511b86b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032545" comment="libtiff-32bit less than 9-200410202150"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032546" comment="libtiff-32bit less than 9-200410212027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032547" comment="libtiff-64bit less than 9-200410210007"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032548" comment="libtiff-x86 less than 9-200410202139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032549" comment="libtiff less than 3.6.1-38.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0807</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0807" source="CVE"/>
	<description>
	Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
	</description>
 </metadata>
<!-- 51640e8f4b2890b6b676c40dd61af7fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032550" comment="samba-client less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032551" comment="samba-pdb less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032552" comment="samba-python less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032553" comment="samba-vscan less than 0.3.4-83.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032554" comment="samba-winbind less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032555" comment="samba less than 3.0.4-1.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0808</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0808" source="CVE"/>
	<description>
	The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
	</description>
 </metadata>
<!-- 51640e8f4b2890b6b676c40dd61af7fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032550" comment="samba-client less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032551" comment="samba-pdb less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032552" comment="samba-python less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032553" comment="samba-vscan less than 0.3.4-83.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032554" comment="samba-winbind less than 3.0.4-1.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032555" comment="samba less than 3.0.4-1.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0809</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0809" source="CVE"/>
	<description>
	The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 031f16f00d8a113c18c9ad3dcf15a055 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032556" comment="mod_dav less than 1.0.3-377.4"/>
	</criteria>
	<!-- d46e1647e774463234c6b7813619514e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032557" comment="apache2-devel less than 2.0.49-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032558" comment="apache2-doc less than 2.0.49-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032559" comment="apache2-example-pages less than 2.0.49-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032560" comment="apache2-prefork less than 2.0.49-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032561" comment="apache2-worker less than 2.0.49-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032562" comment="apache2 less than 2.0.49-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032563" comment="libapr0 less than 2.0.49-27.16"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0814</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0814" source="CVE"/>
	<description>
	Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
		</criteria>
	</criteria>
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0817</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0817" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the imlib BMP image handler allow remote attackers to execute arbitrary code via a crafted BMP file.
	</description>
 </metadata>
<!-- b02e78a5845b470f64220ba1715b1792 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032577" comment="imlib-32bit less than 9-200409021137"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032578" comment="imlib-32bit less than 9-200409021330"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032579" comment="imlib-64bit less than 9-200409021135"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032580" comment="imlib-devel less than 1.9.14-180.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032581" comment="imlib-x86 less than 9-200409021329"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032582" comment="imlib less than 1.9.14-180.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0832</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0832" source="CVE"/>
	<description>
	The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.
	</description>
 </metadata>
<!-- 20ebe5f88a2e9783292dc201bd8f61b6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032583" comment="squid less than 2.5.STABLE5-42.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0835</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835" source="CVE"/>
	<description>
	MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a84b4e78dcc8987da4d2325fb664642 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032584" comment="mysql less than 4.0.18-32.9"/>
	</criteria>
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0836</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836" source="CVE"/>
	<description>
	Buffer overflow in the mysql_real_connect function in MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows remote DNS servers to cause a denial of service and possibly execute arbitrary code via a DNS response with a large address length (h_length).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a84b4e78dcc8987da4d2325fb664642 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032584" comment="mysql less than 4.0.18-32.9"/>
	</criteria>
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0837</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837" source="CVE"/>
	<description>
	MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a84b4e78dcc8987da4d2325fb664642 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032584" comment="mysql less than 4.0.18-32.9"/>
	</criteria>
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0883</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0883" source="CVE"/>
	<description>
	Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45052d3329f87a6d395ebf1dcf0f5b95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 813fdf370053f0b3c6c44d3451a5152e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032586" comment="kernel-um less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032587" comment="um-host-install-initrd less than 1.0-48.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032588" comment="um-host-kernel less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 8e18d7cc815e7fd96789018667b0dc56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032589" comment="kernel-64k-pagesize less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032590" comment="kernel-sn2 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bc6570ee193949696872f698991ed49d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032591" comment="kernel-iseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032592" comment="kernel-pmac64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032593" comment="kernel-pseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bd8281abddbc1a4b203d8559bc89e01a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032594" comment="kernel-s390 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- eceb314cde15f1fd4f18001c29a65a5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032595" comment="kernel-s390x less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0884</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0884" source="CVE"/>
	<description>
	The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
	</description>
 </metadata>
<!-- 7f22d1fa5c0ced8ea65464187fdd329f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032596" comment="cyrus-sasl-32bit less than 9-200410081851"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032597" comment="cyrus-sasl-32bit less than 9-200410082201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032598" comment="cyrus-sasl-64bit less than 9-200410082105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032599" comment="cyrus-sasl-devel-32bit less than 9-200410081851"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032600" comment="cyrus-sasl-devel-32bit less than 9-200410082201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032601" comment="cyrus-sasl-devel-64bit less than 9-200410082105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032602" comment="cyrus-sasl-devel less than 2.1.18-33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032603" comment="cyrus-sasl-x86 less than 9-200410081842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032604" comment="cyrus-sasl less than 2.1.18-33.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0885</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0885" source="CVE"/>
	<description>
	The mod_ssl module in Apache 2.0.35 through 2.0.52, when using the "SSLCipherSuite" directive in directory or location context, allows remote clients to bypass intended restrictions by using any cipher suite that is allowed by the virtual host configuration.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91ec22b46babba982fa9b8cd69030968 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032605" comment="apache2-devel less than 2.0.49-27.18.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032606" comment="apache2-doc less than 2.0.49-27.18.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032607" comment="apache2-example-pages less than 2.0.49-27.18.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032608" comment="apache2-prefork less than 2.0.49-27.18.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032609" comment="apache2-worker less than 2.0.49-27.18.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032610" comment="apache2 less than 2.0.49-27.18.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030432" comment="libapr0 less than 2.0.49-27.18.3"/>
		</criteria>
	</criteria>
	<!-- e2d9838c404c87687b26f66baa345567 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032611" comment="apache less than 1.3.29-71.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032612" comment="mod_ssl less than 2.8.16-71.15"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0886</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0886" source="CVE"/>
	<description>
	Multiple integer overflows in libtiff 3.6.1 and earlier allow remote attackers to cause a denial of service (crash or memory corruption) via TIFF images that lead to incorrect malloc calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b041aa0ff3776ef001f5ef9590ac9bd6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030416" comment="kdegraphics3-fax less than 3.2.1-67.12"/>
	</criteria>
	<!-- b96ddd23c856292e6f2d3271d511b86b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032545" comment="libtiff-32bit less than 9-200410202150"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032546" comment="libtiff-32bit less than 9-200410212027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032547" comment="libtiff-64bit less than 9-200410210007"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032548" comment="libtiff-x86 less than 9-200410202139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032549" comment="libtiff less than 3.6.1-38.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0888</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888" source="CVE"/>
	<description>
	Multiple integer overflows in xpdf 2.0 and 3.0, and other packages that use xpdf code such as CUPS, gpdf, and kdegraphics, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0889.
	</description>
 </metadata>
<!-- 19d6b87a34dfb2163b6961814dad275c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030433" comment="cups-client less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030434" comment="cups-devel less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032613" comment="cups-libs-32bit less than 9-200411082338"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032614" comment="cups-libs-32bit less than 9-200411090434"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032615" comment="cups-libs-64bit less than 9-200411090337"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032616" comment="cups-libs-x86 less than 9-200411082329"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030435" comment="cups-libs less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030436" comment="cups less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032617" comment="foomatic-filters less than 3.0.1-41.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0889</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0889" source="CVE"/>
	<description>
	Multiple integer overflows in xpdf 3.0, and other packages that use xpdf code such as CUPS, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, a different set of vulnerabilities than those identified by CVE-2004-0888.
	</description>
 </metadata>
<!-- 19d6b87a34dfb2163b6961814dad275c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030433" comment="cups-client less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030434" comment="cups-devel less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032613" comment="cups-libs-32bit less than 9-200411082338"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032614" comment="cups-libs-32bit less than 9-200411090434"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032615" comment="cups-libs-64bit less than 9-200411090337"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032616" comment="cups-libs-x86 less than 9-200411082329"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030435" comment="cups-libs less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030436" comment="cups less than 1.1.20-108.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032617" comment="foomatic-filters less than 3.0.1-41.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0902</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0902" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via (1) the "Send page" functionality, (2) certain responses from a malicious POP3 server, or (3) a link containing a non-ASCII hostname.
	</description>
 </metadata>
<!-- c74268c90252958dc57e3784d1d30f80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032618" comment="mozilla-calendar less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032619" comment="mozilla-dom-inspector less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032620" comment="mozilla-irc less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032621" comment="mozilla-mail less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032622" comment="mozilla-venkman less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032623" comment="mozilla less than 1.6-74.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0903</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0903" source="CVE"/>
	<description>
	Stack-based buffer overflow in the writeGroup function in nsVCardObj.cpp for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to execute arbitrary code via malformed VCard attachments that are not properly handled when previewing a message.
	</description>
 </metadata>
<!-- c74268c90252958dc57e3784d1d30f80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032618" comment="mozilla-calendar less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032619" comment="mozilla-dom-inspector less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032620" comment="mozilla-irc less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032621" comment="mozilla-mail less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032622" comment="mozilla-venkman less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032623" comment="mozilla less than 1.6-74.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0904</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0904" source="CVE"/>
	<description>
	Integer overflow in the bitmap (BMP) decoder for Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allow remote attackers to execute arbitrary code via wide bitmap files that trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- c74268c90252958dc57e3784d1d30f80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032618" comment="mozilla-calendar less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032619" comment="mozilla-dom-inspector less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032620" comment="mozilla-irc less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032621" comment="mozilla-mail less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032622" comment="mozilla-venkman less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032623" comment="mozilla less than 1.6-74.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0905</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0905" source="CVE"/>
	<description>
	Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows remote attackers to perform cross-domain scripting and possibly execute arbitrary code by convincing a user to drag and drop javascript: links to a frame or page in another domain.
	</description>
 </metadata>
<!-- c74268c90252958dc57e3784d1d30f80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032618" comment="mozilla-calendar less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032619" comment="mozilla-dom-inspector less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032620" comment="mozilla-irc less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032621" comment="mozilla-mail less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032622" comment="mozilla-venkman less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032623" comment="mozilla less than 1.6-74.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0906</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0906" source="CVE"/>
	<description>
	The XPInstall installer in Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 sets insecure permissions for certain installed files within xpi packages, which could allow local users to overwrite arbitrary files or execute arbitrary code.
	</description>
 </metadata>
<!-- c74268c90252958dc57e3784d1d30f80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032618" comment="mozilla-calendar less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032619" comment="mozilla-dom-inspector less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032620" comment="mozilla-irc less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032621" comment="mozilla-mail less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032622" comment="mozilla-venkman less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032623" comment="mozilla less than 1.6-74.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0908</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0908" source="CVE"/>
	<description>
	Mozilla Firefox before the Preview Release, Mozilla before 1.7.3, and Thunderbird before 0.8 allows untrusted Javascript code to read and write to the clipboard, and possibly obtain sensitive information, via script-generated events such as Ctrl-Ins.
	</description>
 </metadata>
<!-- c74268c90252958dc57e3784d1d30f80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032618" comment="mozilla-calendar less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032619" comment="mozilla-dom-inspector less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032620" comment="mozilla-irc less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032621" comment="mozilla-mail less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032622" comment="mozilla-venkman less than 1.6-74.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032623" comment="mozilla less than 1.6-74.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0918</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0918" source="CVE"/>
	<description>
	The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
	</description>
 </metadata>
<!-- ca1d3bfa57ff6866dc44f996cd8f0472 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032624" comment="squid less than 2.5.STABLE5-42.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0929</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0929" source="CVE"/>
	<description>
	Heap-based buffer overflow in the OJPEGVSetField function in tif_ojpeg.c for libtiff 3.6.1 and earlier, when compiled with the OJPEG_SUPPORT (old JPEG support) option, allows remote attackers to execute arbitrary code via a malformed TIFF image.
	</description>
 </metadata>
<!-- b96ddd23c856292e6f2d3271d511b86b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032545" comment="libtiff-32bit less than 9-200410202150"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032546" comment="libtiff-32bit less than 9-200410212027"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032547" comment="libtiff-64bit less than 9-200410210007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032548" comment="libtiff-x86 less than 9-200410202139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032549" comment="libtiff less than 3.6.1-38.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0930</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0930" source="CVE"/>
	<description>
	The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
	</description>
 </metadata>
<!-- 102b4db1a258893e865573de19d19fa8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030437" comment="samba less than 3.0.4-1.34.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0938</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0938" source="CVE"/>
	<description>
	FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (server crash) by sending an Ascend-Send-Secret attribute without the required leading packet.
	</description>
 </metadata>
<!-- 6d94d15d144c0738548667aef4fbdcf5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032625" comment="freeradius less than 0.9.3-106.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0940</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0940" source="CVE"/>
	<description>
	Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
	</description>
 </metadata>
<!-- e2d9838c404c87687b26f66baa345567 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032611" comment="apache less than 1.3.29-71.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032612" comment="mod_ssl less than 2.8.16-71.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0942</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0942" source="CVE"/>
	<description>
	Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
	</description>
 </metadata>
<!-- 91ec22b46babba982fa9b8cd69030968 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032605" comment="apache2-devel less than 2.0.49-27.18.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032606" comment="apache2-doc less than 2.0.49-27.18.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032607" comment="apache2-example-pages less than 2.0.49-27.18.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032608" comment="apache2-prefork less than 2.0.49-27.18.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032609" comment="apache2-worker less than 2.0.49-27.18.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032610" comment="apache2 less than 2.0.49-27.18.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030432" comment="libapr0 less than 2.0.49-27.18.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0947</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0947" source="CVE"/>
	<description>
	Buffer overflow in unarj before 2.63a-r2 allows remote attackers to execute arbitrary code via an arj archive that contains long filenames.
	</description>
 </metadata>
<!-- a5f90882910c626aab4a025ec490d1ae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030438" comment="unarj less than 2.65-131.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0949</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0949" source="CVE"/>
	<description>
	The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45052d3329f87a6d395ebf1dcf0f5b95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 813fdf370053f0b3c6c44d3451a5152e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032586" comment="kernel-um less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032587" comment="um-host-install-initrd less than 1.0-48.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032588" comment="um-host-kernel less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 8e18d7cc815e7fd96789018667b0dc56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032589" comment="kernel-64k-pagesize less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032590" comment="kernel-sn2 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bc6570ee193949696872f698991ed49d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032591" comment="kernel-iseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032592" comment="kernel-pmac64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032593" comment="kernel-pseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bd8281abddbc1a4b203d8559bc89e01a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032594" comment="kernel-s390 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- eceb314cde15f1fd4f18001c29a65a5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032595" comment="kernel-s390x less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0956</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0956" source="CVE"/>
	<description>
	MySQL before 4.0.20 allows remote attackers to cause a denial of service (application crash) via a MATCH AGAINST query with an opening double quote but no closing double quote.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a84b4e78dcc8987da4d2325fb664642 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032584" comment="mysql less than 4.0.18-32.9"/>
	</criteria>
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0957</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0957" source="CVE"/>
	<description>
	Unknown vulnerability in MySQL 3.23.58 and earlier, when a local user has privileges for a database whose name includes a "_" (underscore), grants privileges to other databases that have similar names, which can allow the user to conduct unauthorized activities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a84b4e78dcc8987da4d2325fb664642 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032584" comment="mysql less than 4.0.18-32.9"/>
	</criteria>
	<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0960</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0960" source="CVE"/>
	<description>
	FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (core dump) via malformed USR vendor-specific attributes (VSA) that cause a memcpy operation with a -1 argument.
	</description>
 </metadata>
<!-- 6d94d15d144c0738548667aef4fbdcf5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032625" comment="freeradius less than 0.9.3-106.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0961</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0961" source="CVE"/>
	<description>
	Memory leak in FreeRADIUS before 1.0.1 allows remote attackers to cause a denial of service (memory exhaustion) via a series of Access-Request packets with (1) Ascend-Send-Secret, (2) Ascend-Recv-Secret, or (3) Tunnel-Password attributes.
	</description>
 </metadata>
<!-- 6d94d15d144c0738548667aef4fbdcf5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032625" comment="freeradius less than 0.9.3-106.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0983</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0983" source="CVE"/>
	<description>
	The CGI module in Ruby 1.6 before 1.6.8, and 1.8 before 1.8.2, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a certain HTTP request.
	</description>
 </metadata>
<!-- c28d786afb20c82c552cde5011cce640 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030439" comment="ruby less than 1.8.1-42.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0986</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0986" source="CVE"/>
	<description>
	Iptables before 1.2.11, under certain conditions, does not properly load the required modules at system startup, which causes the firewall rules to fail to load and protect the system from remote attackers.
	</description>
 </metadata>
<!-- b65afd202cc63349150e1823cfa35203 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032626" comment="iptables less than 1.2.9-95.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0989</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0989" source="CVE"/>
	<description>
	Multiple buffer overflows in libXML 2.6.12 and 2.6.13 (libxml2), and possibly other versions, may allow remote attackers to execute arbitrary code via (1) a long FTP URL that is not properly handled by the xmlNanoFTPScanURL function, (2) a long proxy URL containing FTP data that is not properly handled by the xmlNanoFTPScanProxy function, and other overflows related to manipulation of DNS length values, including (3) xmlNanoFTPConnect, (4) xmlNanoHTTPConnectHost, and (5) xmlNanoHTTPConnectHost.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ebcaf61f6debd12131a1753d095345dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032414" comment="libxml-32bit less than 9-200412202049"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032415" comment="libxml-32bit less than 9-200412202205"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032416" comment="libxml-64bit less than 9-200412202113"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030409" comment="libxml-devel less than 1.8.17-366.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032417" comment="libxml-x86 less than 9-200412202214"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030410" comment="libxml less than 1.8.17-366.4"/>
		</criteria>
	</criteria>
	<!-- ffea3eaf97e43abb88f477ec4f689352 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032627" comment="libxml2-32bit less than 9-200410281810"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032628" comment="libxml2-32bit less than 9-200410291429"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032629" comment="libxml2-64bit less than 9-200410291649"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032630" comment="libxml2-devel less than 2.6.7-28.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032631" comment="libxml2-x86 less than 9-200410291421"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032632" comment="libxml2 less than 2.6.7-28.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0990</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0990" source="CVE"/>
	<description>
	Integer overflow in GD Graphics Library libgd 2.0.28 (libgd2), and possibly other versions, allows remote attackers to cause a denial of service and possibly execute arbitrary code via PNG image files with large image rows values that lead to a heap-based buffer overflow in the gdImageCreateFromPngCtx function, a different set of vulnerabilities than CVE-2004-0941.
	</description>
 </metadata>
<!-- 9dcd06f3f2cfeb4893ddff4b8c520bdf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032633" comment="gd-devel less than 2.0.22-65.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032634" comment="gd less than 2.0.22-65.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1004</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1004" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
	</description>
 </metadata>
<!-- e702fc9f046fac6627f47fbba14635c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030441" comment="mc less than 4.6.0-324.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1005</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1005" source="CVE"/>
	<description>
	Multiple buffer overflows in Midnight Commander (mc) 4.5.55 and earlier allow remote attackers to have an unknown impact.
	</description>
 </metadata>
<!-- e702fc9f046fac6627f47fbba14635c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030441" comment="mc less than 4.6.0-324.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1010</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1010" source="CVE"/>
	<description>
	Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote attackers to execute arbitrary code via a ZIP file containing a long pathname.
	</description>
 </metadata>
<!-- dfed4f3cf36d0008c8f4f5905228183c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030442" comment="zip less than 2.3-732.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1016</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1016" source="CVE"/>
	<description>
	The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0dd603ae33fd9980da99a98000849da8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032635" comment="kernel-64k-pagesize less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032637" comment="kernel-sn2 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 20fe204ab30920b70619e3e473390613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 2630a38b663386e8b39556710372cdc5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032638" comment="kernel-s390 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 46512877e6e877642d8c07a4a10b3f2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032639" comment="kernel-s390x less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 5cd50fd6b9d671d9f7353e6b811dbf2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032640" comment="kernel-iseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032641" comment="kernel-pmac64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032642" comment="kernel-pseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- cacc34d1f090391afbadbdbceedcb110 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032643" comment="kernel-um less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032644" comment="um-host-install-initrd less than 1.0-48.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032645" comment="um-host-kernel less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1019</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1019" source="CVE"/>
	<description>
	The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of service and execute arbitrary code via untrusted data to the unserialize function that may trigger "information disclosure, double-free and negative reference index array underflow" results.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02f7ca620fa47aed580ac78750ea5c52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032646" comment="apache-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032647" comment="apache2-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032648" comment="mod_php4-core less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032649" comment="php4-imap less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032650" comment="php4-mysql less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032651" comment="php4-session less than 4.3.4-43.22"/>
		</criteria>
	</criteria>
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 8e92be327165b504dec328c05ca4220b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032678" comment="mod_php4-servlet less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b0cc027d40188c4f2c516845c31cc69f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- b5002af82ab84dcd046d50ac0c81569f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032646" comment="apache-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032647" comment="apache2-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032648" comment="mod_php4-core less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032688" comment="mod_php4-servlet less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032649" comment="php4-imap less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032650" comment="php4-mysql less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032651" comment="php4-session less than 4.3.4-43.22"/>
		</criteria>
	</criteria>
	<!-- bb15f54cd03e743f9f9dd09ccc912493 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032692" comment="mod_php4-servlet less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- cb26dfd5c2e6259554ea496104a27638 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032700" comment="apache-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032701" comment="apache2-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032702" comment="mod_php4-core less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032703" comment="php4-imap less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032704" comment="php4-mysql less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032705" comment="php4-session less than 4.3.4-43.25"/>
		</criteria>
	</criteria>
	<!-- cc14ff30cea8ef2a4bca1724427c70e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032700" comment="apache-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032701" comment="apache2-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032702" comment="mod_php4-core less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032706" comment="mod_php4-servlet less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032703" comment="php4-imap less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032704" comment="php4-mysql less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032705" comment="php4-session less than 4.3.4-43.25"/>
		</criteria>
	</criteria>
	<!-- cc880d8594257d1c37f5c5e40549ab75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- eb6734193188e5e67d6f06e03c942de2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
	<!-- ee8460dd87ca30f8864ad2c388d24504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032716" comment="mod_php4-servlet less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1025</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1025" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.
	</description>
 </metadata>
<!-- c86d1e9fa933ec51c76978e754b49b51 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032717" comment="imlib-32bit less than 9-200411221740"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032718" comment="imlib-32bit less than 9-200411221926"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032719" comment="imlib-64bit less than 9-200411221819"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030448" comment="imlib-devel less than 1.9.14-180.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032720" comment="imlib-x86 less than 9-200411221914"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030449" comment="imlib less than 1.9.14-180.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1026</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1026" source="CVE"/>
	<description>
	Multiple integer overflows in the image handler for imlib 1.9.14 and earlier, which is used by gkrellm and several window managers, allow remote attackers to cause a denial of service (application crash) and execute arbitrary code via certain image files.
	</description>
 </metadata>
<!-- c86d1e9fa933ec51c76978e754b49b51 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032717" comment="imlib-32bit less than 9-200411221740"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032718" comment="imlib-32bit less than 9-200411221926"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032719" comment="imlib-64bit less than 9-200411221819"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030448" comment="imlib-devel less than 1.9.14-180.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032720" comment="imlib-x86 less than 9-200411221914"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030449" comment="imlib less than 1.9.14-180.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1029</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1029" source="CVE"/>
	<description>
	The Sun Java Plugin capability in Java 2 Runtime Environment (JRE) 1.4.2_01, 1.4.2_04, and possibly earlier versions, does not properly restrict access between Javascript and Java applets during data transfer, which allows remote attackers to load unsafe classes and execute arbitrary code by using the reflection API to access private Java packages.
	</description>
 </metadata>
<!-- 782bc79c0ff0ddb58008cb48b00673f8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030450" comment="java2-jre less than 1.4.2-129.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030451" comment="java2 less than 1.4.2-129.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1065</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1065" source="CVE"/>
	<description>
	Buffer overflow in the exif_read_data function in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to execute arbitrary code via a long section name in an image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02f7ca620fa47aed580ac78750ea5c52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032646" comment="apache-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032647" comment="apache2-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032648" comment="mod_php4-core less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032649" comment="php4-imap less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032650" comment="php4-mysql less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032651" comment="php4-session less than 4.3.4-43.22"/>
		</criteria>
	</criteria>
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 8e92be327165b504dec328c05ca4220b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032678" comment="mod_php4-servlet less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b0cc027d40188c4f2c516845c31cc69f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- b5002af82ab84dcd046d50ac0c81569f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032646" comment="apache-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032647" comment="apache2-mod_php4 less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032648" comment="mod_php4-core less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032688" comment="mod_php4-servlet less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032649" comment="php4-imap less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032650" comment="php4-mysql less than 4.3.4-43.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032651" comment="php4-session less than 4.3.4-43.22"/>
		</criteria>
	</criteria>
	<!-- bb15f54cd03e743f9f9dd09ccc912493 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032692" comment="mod_php4-servlet less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- cb26dfd5c2e6259554ea496104a27638 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032700" comment="apache-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032701" comment="apache2-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032702" comment="mod_php4-core less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032703" comment="php4-imap less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032704" comment="php4-mysql less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032705" comment="php4-session less than 4.3.4-43.25"/>
		</criteria>
	</criteria>
	<!-- cc14ff30cea8ef2a4bca1724427c70e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032700" comment="apache-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032701" comment="apache2-mod_php4 less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032702" comment="mod_php4-core less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032706" comment="mod_php4-servlet less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032703" comment="php4-imap less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032704" comment="php4-mysql less than 4.3.4-43.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032705" comment="php4-session less than 4.3.4-43.25"/>
		</criteria>
	</criteria>
	<!-- cc880d8594257d1c37f5c5e40549ab75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- eb6734193188e5e67d6f06e03c942de2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
	<!-- ee8460dd87ca30f8864ad2c388d24504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032716" comment="mod_php4-servlet less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1068</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1068" source="CVE"/>
	<description>
	A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0dd603ae33fd9980da99a98000849da8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032635" comment="kernel-64k-pagesize less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032637" comment="kernel-sn2 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 20fe204ab30920b70619e3e473390613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 2630a38b663386e8b39556710372cdc5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032638" comment="kernel-s390 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 46512877e6e877642d8c07a4a10b3f2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032639" comment="kernel-s390x less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 5cd50fd6b9d671d9f7353e6b811dbf2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032640" comment="kernel-iseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032641" comment="kernel-pmac64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032642" comment="kernel-pseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- cacc34d1f090391afbadbdbceedcb110 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032643" comment="kernel-um less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032644" comment="um-host-install-initrd less than 1.0-48.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032645" comment="um-host-kernel less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1070</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1070" source="CVE"/>
	<description>
	The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45052d3329f87a6d395ebf1dcf0f5b95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 813fdf370053f0b3c6c44d3451a5152e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032586" comment="kernel-um less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032587" comment="um-host-install-initrd less than 1.0-48.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032588" comment="um-host-kernel less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 8e18d7cc815e7fd96789018667b0dc56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032589" comment="kernel-64k-pagesize less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032590" comment="kernel-sn2 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bc6570ee193949696872f698991ed49d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032591" comment="kernel-iseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032592" comment="kernel-pmac64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032593" comment="kernel-pseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bd8281abddbc1a4b203d8559bc89e01a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032594" comment="kernel-s390 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- eceb314cde15f1fd4f18001c29a65a5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032595" comment="kernel-s390x less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1071</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1071" source="CVE"/>
	<description>
	The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45052d3329f87a6d395ebf1dcf0f5b95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 813fdf370053f0b3c6c44d3451a5152e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032586" comment="kernel-um less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032587" comment="um-host-install-initrd less than 1.0-48.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032588" comment="um-host-kernel less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 8e18d7cc815e7fd96789018667b0dc56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032589" comment="kernel-64k-pagesize less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032590" comment="kernel-sn2 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bc6570ee193949696872f698991ed49d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032591" comment="kernel-iseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032592" comment="kernel-pmac64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032593" comment="kernel-pseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bd8281abddbc1a4b203d8559bc89e01a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032594" comment="kernel-s390 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- eceb314cde15f1fd4f18001c29a65a5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032595" comment="kernel-s390x less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1072</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1072" source="CVE"/>
	<description>
	The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45052d3329f87a6d395ebf1dcf0f5b95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 813fdf370053f0b3c6c44d3451a5152e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032586" comment="kernel-um less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032587" comment="um-host-install-initrd less than 1.0-48.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032588" comment="um-host-kernel less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 8e18d7cc815e7fd96789018667b0dc56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032589" comment="kernel-64k-pagesize less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032590" comment="kernel-sn2 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bc6570ee193949696872f698991ed49d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032591" comment="kernel-iseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032592" comment="kernel-pmac64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032593" comment="kernel-pseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bd8281abddbc1a4b203d8559bc89e01a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032594" comment="kernel-s390 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- eceb314cde15f1fd4f18001c29a65a5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032595" comment="kernel-s390x less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1073</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1073" source="CVE"/>
	<description>
	The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45052d3329f87a6d395ebf1dcf0f5b95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 813fdf370053f0b3c6c44d3451a5152e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032586" comment="kernel-um less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032587" comment="um-host-install-initrd less than 1.0-48.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032588" comment="um-host-kernel less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 8e18d7cc815e7fd96789018667b0dc56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032589" comment="kernel-64k-pagesize less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032590" comment="kernel-sn2 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bc6570ee193949696872f698991ed49d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032591" comment="kernel-iseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032592" comment="kernel-pmac64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032593" comment="kernel-pseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bd8281abddbc1a4b203d8559bc89e01a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032594" comment="kernel-s390 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- eceb314cde15f1fd4f18001c29a65a5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032595" comment="kernel-s390x less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1074</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1074" source="CVE"/>
	<description>
	The binfmt functionality in the Linux kernel, when "memory overcommit" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 45052d3329f87a6d395ebf1dcf0f5b95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 813fdf370053f0b3c6c44d3451a5152e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030427" comment="kernel-bigsmp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032586" comment="kernel-um less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032587" comment="um-host-install-initrd less than 1.0-48.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032588" comment="um-host-kernel less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- 8e18d7cc815e7fd96789018667b0dc56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032589" comment="kernel-64k-pagesize less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032585" comment="kernel-debug less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032590" comment="kernel-sn2 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bc6570ee193949696872f698991ed49d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030428" comment="kernel-default less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032591" comment="kernel-iseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032592" comment="kernel-pmac64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032593" comment="kernel-pseries64 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030429" comment="kernel-smp less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- bd8281abddbc1a4b203d8559bc89e01a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032594" comment="kernel-s390 less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
	<!-- eceb314cde15f1fd4f18001c29a65a5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032595" comment="kernel-s390x less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030430" comment="kernel-source less than 2.6.5-7.111.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030431" comment="kernel-syms less than 2.6.5-7.111.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1079</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1079" source="CVE"/>
	<description>
	Buffer overflow in (1) ncplogin and (2) ncpmap in nwclient.c for ncpfs 2.2.4, and possibly other versions, may allow local users to gain privileges via a long -T option.
	</description>
 </metadata>
<!-- 1ff6e6ba79e765dbf4515f2a5380cdd6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032721" comment="ncpfs-devel less than 2.2.4-25.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032722" comment="ncpfs less than 2.2.4-25.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1125</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125" source="CVE"/>
	<description>
	Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032723" comment="cups-libs-32bit less than 9-200501280610"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032724" comment="cups-libs-32bit less than 9-200501281513"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032725" comment="cups-libs-64bit less than 9-200501280648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032726" comment="cups-libs-x86 less than 9-200501280558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1137</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1137" source="CVE"/>
	<description>
	Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0dd603ae33fd9980da99a98000849da8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032635" comment="kernel-64k-pagesize less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032637" comment="kernel-sn2 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 20fe204ab30920b70619e3e473390613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 2630a38b663386e8b39556710372cdc5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032638" comment="kernel-s390 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 46512877e6e877642d8c07a4a10b3f2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032639" comment="kernel-s390x less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 5cd50fd6b9d671d9f7353e6b811dbf2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032640" comment="kernel-iseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032641" comment="kernel-pmac64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032642" comment="kernel-pseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- cacc34d1f090391afbadbdbceedcb110 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032643" comment="kernel-um less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032644" comment="um-host-install-initrd less than 1.0-48.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032645" comment="um-host-kernel less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1139</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1139" source="CVE"/>
	<description>
	Unknown vulnerability in the DICOM dissector in Ethereal 0.10.4 through 0.10.7 allows remote attackers to cause a denial of service (application crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1140</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1140" source="CVE"/>
	<description>
	Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (application hang) and possibly fill available disk space via an invalid RTP timestamp.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1141</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1141" source="CVE"/>
	<description>
	The HTTP dissector in Ethereal 0.10.1 through 0.10.7 allows remote attackers to cause a denial of service (application crash) via a certain packet that causes the dissector to access previously-freed memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1142</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1142" source="CVE"/>
	<description>
	Ethereal 0.9.0 through 0.10.7 allows remote attackers to cause a denial of service (CPU consumption) via a certain malformed SMB packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1145</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1145" source="CVE"/>
	<description>
	Multiple vulnerabilities in Konqueror in KDE 3.3.1 and earlier (1) allow access to restricted Java classes via JavaScript and (2) do not properly restrict access to certain Java classes from the Java applet, which allows remote attackers to bypass sandbox restrictions and read or write arbitrary files.
	</description>
 </metadata>
<!-- eccaba5e191d6a572849d18ad0f149ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032729" comment="kdelibs3-32bit less than 9-200501242029"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032730" comment="kdelibs3-32bit less than 9-200501250047"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032731" comment="kdelibs3-64bit less than 9-200501242152"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032732" comment="kdelibs3-x86 less than 9-200501242018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030456" comment="kdelibs3 less than 3.2.1-44.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1151</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1151" source="CVE"/>
	<description>
	Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0dd603ae33fd9980da99a98000849da8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032635" comment="kernel-64k-pagesize less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032637" comment="kernel-sn2 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 20fe204ab30920b70619e3e473390613 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 2630a38b663386e8b39556710372cdc5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032638" comment="kernel-s390 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 46512877e6e877642d8c07a4a10b3f2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032639" comment="kernel-s390x less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- 5cd50fd6b9d671d9f7353e6b811dbf2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032640" comment="kernel-iseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032641" comment="kernel-pmac64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032642" comment="kernel-pseries64 less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
	<!-- cacc34d1f090391afbadbdbceedcb110 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030443" comment="kernel-bigsmp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032636" comment="kernel-debug less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030444" comment="kernel-default less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030445" comment="kernel-smp less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030446" comment="kernel-source less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030447" comment="kernel-syms less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032643" comment="kernel-um less than 2.6.5-7.111.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032644" comment="um-host-install-initrd less than 1.0-48.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032645" comment="um-host-kernel less than 2.6.5-7.111.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1152</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1152" source="CVE"/>
	<description>
	Buffer overflow in the mailListIsPdf function in Adobe Acrobat Reader 5.09 for Unix allows remote attackers to execute arbitrary code via an e-mail message with a crafted PDF attachment.
	</description>
 </metadata>
<!-- e77160ba6ee3d156fc8dd86250343c9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030457" comment="acroread less than 5.010-4.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1154</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1154" source="CVE"/>
	<description>
	Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 1bb1fd92d2c4e26305cb8bfcbdad21dd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032733" comment="libsmbclient-32bit less than 9-200412172026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032734" comment="libsmbclient-32bit less than 9-200412172350"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032735" comment="libsmbclient-64bit less than 9-200412172257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030458" comment="libsmbclient-devel less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030459" comment="libsmbclient less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030460" comment="samba-client less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030461" comment="samba-doc less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030462" comment="samba-pdb less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030463" comment="samba-python less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030464" comment="samba-vscan less than 0.3.5-11.7.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030465" comment="samba-winbind less than 3.0.9-2.1.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030466" comment="samba less than 3.0.9-2.1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1158</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1158" source="CVE"/>
	<description>
	Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by injecting content from one window into a target window or tab whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- eccaba5e191d6a572849d18ad0f149ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032729" comment="kdelibs3-32bit less than 9-200501242029"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032730" comment="kdelibs3-32bit less than 9-200501250047"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032731" comment="kdelibs3-64bit less than 9-200501242152"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032732" comment="kdelibs3-x86 less than 9-200501242018"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030456" comment="kdelibs3 less than 3.2.1-44.39"/>
		</criteria>
	</criteria>
	<!-- f8d3c9b67e958bfd5cbc688fc6ac76b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032736" comment="kdebase3-32bit less than 9-200501242029"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032737" comment="kdebase3-32bit less than 9-200501250047"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032738" comment="kdebase3-64bit less than 9-200501242152"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032739" comment="kdebase3-x86 less than 9-200501242018"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030467" comment="kdebase3 less than 3.2.1-68.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1170</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1170" source="CVE"/>
	<description>
	a2ps 4.13 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename.
	</description>
 </metadata>
<!-- 74a5bf97afe2646da7a939d88a7cb1b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032740" comment="a2ps less than 4.13-1046.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1176</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1176" source="CVE"/>
	<description>
	Buffer underflow in extfs.c in Midnight Commander (mc) 4.5.55 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- e702fc9f046fac6627f47fbba14635c5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030441" comment="mc less than 4.6.0-324.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1177</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1177" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.
	</description>
 </metadata>
<!-- 02672f09967fbca5a290823e489c26af -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030468" comment="mailman less than 2.1.4-83.16.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1183</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1183" source="CVE"/>
	<description>
	Integer overflow in the tiffdump utility for libtiff 3.7.1 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 18a037c784e0b7cd1b0d6d2d678e3b55 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032741" comment="libtiff-32bit less than 9-200501041713"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032742" comment="libtiff-32bit less than 9-200501042255"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032743" comment="libtiff-64bit less than 9-200501041834"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032744" comment="libtiff-x86 less than 9-200501041705"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030470" comment="libtiff less than 3.6.1-38.14"/>
		</criteria>
	</criteria>
	<!-- bb8e62a045c2aac0f526baac5a12c948 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030471" comment="tiff less than 3.6.1-38.14"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1184</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1184" source="CVE"/>
	<description>
	The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
	</description>
 </metadata>
<!-- 710731c2084694b924777e34da67a64c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1185</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1185" source="CVE"/>
	<description>
	Enscript 1.6.3 does not sanitize filenames, which allows remote attackers or local users to execute arbitrary commands via crafted filenames.
	</description>
 </metadata>
<!-- 710731c2084694b924777e34da67a64c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1186</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1186" source="CVE"/>
	<description>
	Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).
	</description>
 </metadata>
<!-- 710731c2084694b924777e34da67a64c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030472" comment="enscript less than 1.6.2-814.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1235</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1235" source="CVE"/>
	<description>
	Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 303377550ee97916c59afca6d7adf50f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030475" comment="kernel-default less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030476" comment="kernel-smp less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030477" comment="kernel-source less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030478" comment="kernel-syms less than 2.6.5-7.111.30"/>
		</criteria>
	</criteria>
	<!-- 3a05fb40f90644d48b93f5e8fb53ce03 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032745" comment="kernel-s390 less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030477" comment="kernel-source less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030478" comment="kernel-syms less than 2.6.5-7.111.30"/>
		</criteria>
	</criteria>
	<!-- 7137620a0af5426453c48a1235c34962 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032746" comment="kernel-64k-pagesize less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032747" comment="kernel-debug less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030475" comment="kernel-default less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032748" comment="kernel-sn2 less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030477" comment="kernel-source less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030478" comment="kernel-syms less than 2.6.5-7.111.30"/>
		</criteria>
	</criteria>
	<!-- 7cb4af3aea86af46dfe6dec778cc8168 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030475" comment="kernel-default less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032749" comment="kernel-iseries64 less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032750" comment="kernel-pmac64 less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032751" comment="kernel-pseries64 less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030476" comment="kernel-smp less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030477" comment="kernel-source less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030478" comment="kernel-syms less than 2.6.5-7.111.30"/>
		</criteria>
	</criteria>
	<!-- 8494b1da78e4b765909cacbb0215523a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030474" comment="kernel-bigsmp less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032747" comment="kernel-debug less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030475" comment="kernel-default less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030476" comment="kernel-smp less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030477" comment="kernel-source less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030478" comment="kernel-syms less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032752" comment="kernel-um less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032753" comment="um-host-install-initrd less than 1.0-48.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032754" comment="um-host-kernel less than 2.6.5-7.111.30"/>
		</criteria>
	</criteria>
	<!-- 85e05760b3103f0f201e798508c3e7cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032755" comment="kernel-s390x less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030477" comment="kernel-source less than 2.6.5-7.111.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030478" comment="kernel-syms less than 2.6.5-7.111.30"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1267</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1267" source="CVE"/>
	<description>
	Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attackers to execute arbitrary code via a crafted HPGL file.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032723" comment="cups-libs-32bit less than 9-200501280610"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032724" comment="cups-libs-32bit less than 9-200501281513"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032725" comment="cups-libs-64bit less than 9-200501280648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032726" comment="cups-libs-x86 less than 9-200501280558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1268</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1268" source="CVE"/>
	<description>
	lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032723" comment="cups-libs-32bit less than 9-200501280610"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032724" comment="cups-libs-32bit less than 9-200501281513"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032725" comment="cups-libs-64bit less than 9-200501280648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032726" comment="cups-libs-x86 less than 9-200501280558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1304</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1304" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ELF header parsing code in file before 4.12 allows attackers to execute arbitrary code via a crafted ELF file.
	</description>
 </metadata>
<!-- 381e2bac88c1021fd101ecffeded4618 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032756" comment="file-32bit less than 9-200412071354"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032757" comment="file-32bit less than 9-200412071355"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032758" comment="file-64bit less than 9-200412071401"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032759" comment="file-x86 less than 9-200412071353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030479" comment="file less than 4.07-48.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1333</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1333" source="CVE"/>
	<description>
	Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
	</description>
 </metadata>
<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1456</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1456" source="CVE"/>
	<description>
	filediff in CVStrac allows remote attackers to execute arbitrary commands via shell metacharacters in rcsinfo.
	</description>
 </metadata>
<!-- 73eab29a6f1e506a3624095eaebb358d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032760" comment="ethereal less than 0.10.11-1.1.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1470</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1470" source="CVE"/>
	<description>
	CRLF injection vulnerability in SnipSnap 0.5.2a, and other versions before 1.0b1, allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server.
	</description>
 </metadata>
<!-- 73eab29a6f1e506a3624095eaebb358d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032760" comment="ethereal less than 0.10.11-1.1.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1487</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1487" source="CVE"/>
	<description>
	wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
	</description>
 </metadata>
<!-- 69ab05af8c65eb68c88d3dcfdde7ce33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030480" comment="wget less than 1.9.1-45.10.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1488</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1488" source="CVE"/>
	<description>
	wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
	</description>
 </metadata>
<!-- e7b01249711fe56bb3b36a58d161aeea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030481" comment="wget less than 1.9.1-45.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20041772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-1772</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-1772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1772" source="CVE"/>
	<description>
	Stack-based buffer overflow in shar in GNU sharutils 4.2.1 allows local users to execute arbitrary code via a long -o command line argument.
	</description>
 </metadata>
<!-- c017779e535f590b8aa70d49948724f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030482" comment="sharutils less than 4.2c-710.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2652</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-2652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2652" source="CVE"/>
	<description>
	The DecodeTCPOptions function in decode.c in Snort before 2.3.0, when printing TCP/IP options using FAST output or verbose mode, allows remote attackers to cause a denial of service (crash) via packets with invalid TCP/IP options, which trigger a null dereference.
	</description>
 </metadata>
<!-- 5089e6d3510ca8b78864f8a2a44eb7da -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030483" comment="snort less than 2.3.2-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2655</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-2655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2655" source="CVE"/>
	<description>
	rdesktop 1.3.1 with xscreensaver 4.14, and possibly other versions, when running on Fedora and possibly other platforms, does not release the keyboard focus when xscreensaver starts, which causes the password to be entered into the active window when the user unlocks the screen.
	</description>
 </metadata>
<!-- 6ab8000970d5ad02e9cb807b3fab486e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032761" comment="xscreensaver less than 4.16-2.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2658</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-2658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2658" source="CVE"/>
	<description>
	resmgr in SUSE CORE 9 does not properly identify terminal names, which allows local users to spoof terminals and login types.
	</description>
 </metadata>
<!-- fa6c6a3e792bf79b1d85821c689ea578 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032762" comment="resmgr-32bit less than 9-200410202150"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032763" comment="resmgr-32bit less than 9-200410212027"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032764" comment="resmgr-64bit less than 9-200410210007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032765" comment="resmgr-x86 less than 9-200410202139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032766" comment="resmgr less than 0.9.8-47.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2680</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-2680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2680" source="CVE"/>
	<description>
	mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.
	</description>
 </metadata>
<!-- ae83e0f8a577fb44058210a131c1707f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032767" comment="apache2-mod_python less than 3.1.3-37.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0006</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0006" source="CVE"/>
	<description>
	The COPS dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (infinite loop).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0007</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0007" source="CVE"/>
	<description>
	Unknown vulnerability in the DLSw dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash from assertion).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0008</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0008" source="CVE"/>
	<description>
	Unknown vulnerability in the DNP dissector in Ethereal 0.10.5 through 0.10.8 allows remote attackers to cause "memory corruption."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0009</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0009" source="CVE"/>
	<description>
	Unknown vulnerability in the Gnutella dissector in Ethereal 0.10.6 through 0.10.8 allows remote attackers to cause a denial of service (application crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0010</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0010" source="CVE"/>
	<description>
	Unknown vulnerability in the MMSE dissector in Ethereal 0.10.4 through 0.10.8 allows remote attackers to cause a denial of service by triggering a free of statically allocated memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0013</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0013" source="CVE"/>
	<description>
	nwclient.c in ncpfs before 2.2.6 does not drop root privileges before executing utilities using the NetWare client functions, which allows local users to gain privileges.
	</description>
 </metadata>
<!-- 011af757e120a14a2fae7dc271470bac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032768" comment="ncpfs-devel less than 2.2.4-25.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030484" comment="ncpfs less than 2.2.4-25.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0014</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0014" source="CVE"/>
	<description>
	Buffer overflow in ncplogin in ncpfs before 2.2.6 allows remote malicious NetWare servers to execute arbitrary code on the NetWare client.
	</description>
 </metadata>
<!-- 011af757e120a14a2fae7dc271470bac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032768" comment="ncpfs-devel less than 2.2.4-25.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030484" comment="ncpfs less than 2.2.4-25.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0064</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064" source="CVE"/>
	<description>
	Buffer overflow in the Decrypt::makeFileKey2 function in Decrypt.cc for xpdf 3.00 and earlier allows remote attackers to execute arbitrary code via a PDF file with a large /Encrypt /Length keyLength value.
	</description>
 </metadata>
<!-- 3ad799a3724f2f9105c795d872dba922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030452" comment="cups-client less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030453" comment="cups-devel less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032723" comment="cups-libs-32bit less than 9-200501280610"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032724" comment="cups-libs-32bit less than 9-200501281513"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032725" comment="cups-libs-64bit less than 9-200501280648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032726" comment="cups-libs-x86 less than 9-200501280558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030454" comment="cups-libs less than 1.1.20-108.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030455" comment="cups less than 1.1.20-108.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0077</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0077" source="CVE"/>
	<description>
	The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
	</description>
 </metadata>
<!-- 8aa98d5798533419fb0a3680753d016e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030485" comment="perl-DBI less than 1.41-28.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0084</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0084" source="CVE"/>
	<description>
	Buffer overflow in the X11 dissector in Ethereal 0.8.10 through 0.10.8 allows remote attackers to execute arbitrary code via a crafted packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04002f442555d12065ebb4ba411fe086 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
	</criteria>
	<!-- 3da7cd4d6bee83b91d40d60bcad8671f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032728" comment="ethereal less than 0.10.3-15.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0085</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0085" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in ht://dig (htdig) before 3.1.6-r7 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.
	</description>
 </metadata>
<!-- fa6460ee9d0f0d2825a93384290f3be6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030486" comment="htdig less than 3.1.6-402.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0088</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0088" source="CVE"/>
	<description>
	The publisher handler for mod_python 2.7.8 and earlier allows remote attackers to obtain access to restricted objects via a crafted URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bc46d14c9c70aa91a3d9b309a88daf9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032769" comment="mod_python less than 2.7.10-83.6"/>
	</criteria>
	<!-- e96984925053acf010b1e884fbc4ab43 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032770" comment="apache2-mod_python less than 3.1.3-37.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0089</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0089" source="CVE"/>
	<description>
	The SimpleXMLRPCServer library module in Python 2.2, 2.3 before 2.3.5, and 2.4, when used by XML-RPC servers that use the register_instance method to register an object without a _dispatch method, allows remote attackers to read or modify globals of the associated module, and possibly execute arbitrary code, via dotted attributes.
	</description>
 </metadata>
<!-- 5eeac52472f698f9b7d58fdd1ad968ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032771" comment="python-32bit less than 9-200502051955"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032772" comment="python-32bit less than 9-200502060348"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032773" comment="python-64bit less than 9-200502060420"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032774" comment="python-x86 less than 9-200502051945"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030487" comment="python less than 2.3.3-88.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0094</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0094" source="CVE"/>
	<description>
	Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.
	</description>
 </metadata>
<!-- 69dddd7a74293a6e4941544ef2bd4761 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032775" comment="squid less than 2.5.STABLE5-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0095</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0095" source="CVE"/>
	<description>
	The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers.
	</description>
 </metadata>
<!-- 69dddd7a74293a6e4941544ef2bd4761 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032775" comment="squid less than 2.5.STABLE5-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0096</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0096" source="CVE"/>
	<description>
	Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (memory consumption).
	</description>
 </metadata>
<!-- 69dddd7a74293a6e4941544ef2bd4761 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032775" comment="squid less than 2.5.STABLE5-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0097</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0097" source="CVE"/>
	<description>
	The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference.
	</description>
 </metadata>
<!-- 69dddd7a74293a6e4941544ef2bd4761 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032775" comment="squid less than 2.5.STABLE5-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0135</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
	</affected>
	<reference ref_id="CVE-2005-0135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0135" source="CVE"/>
	<description>
	The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0136</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
	</affected>
	<reference ref_id="CVE-2005-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0136" source="CVE"/>
	<description>
	The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0155</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155" source="CVE"/>
	<description>
	The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
	</description>
 </metadata>
<!-- 7e6cf48cf7a796f79176269c2c18b8df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032418" comment="perl-32bit less than 9-200502051955"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032419" comment="perl-32bit less than 9-200502060348"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032420" comment="perl-64bit less than 9-200502060420"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032421" comment="perl-x86 less than 9-200502051945"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030411" comment="perl less than 5.8.3-32.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0156</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0156" source="CVE"/>
	<description>
	Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
	</description>
 </metadata>
<!-- 7e6cf48cf7a796f79176269c2c18b8df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032418" comment="perl-32bit less than 9-200502051955"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032419" comment="perl-32bit less than 9-200502060348"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032420" comment="perl-64bit less than 9-200502060420"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032421" comment="perl-x86 less than 9-200502051945"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030411" comment="perl less than 5.8.3-32.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0160</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
	</affected>
	<reference ref_id="CVE-2005-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0160" source="CVE"/>
	<description>
	Multiple buffer overflows in unace 1.2b allow attackers to execute arbitrary code via (1) 2 overflows in ACE archives, (2) a long command line argument, or (3) certain "Ready for next volume" messages.
	</description>
 </metadata>
<!-- a57bec2ad73500fd2a5526eca6b9e9f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030490" comment="unace less than 1.2b-621.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0161</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
	</affected>
	<reference ref_id="CVE-2005-0161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0161" source="CVE"/>
	<description>
	Multiple directory traversal vulnerabilities in unace 1.2b allow attackers to overwrite arbitrary files via an ACE archive containing (1) ../ sequences or (2) absolute pathnames.
	</description>
 </metadata>
<!-- a57bec2ad73500fd2a5526eca6b9e9f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030490" comment="unace less than 1.2b-621.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0177</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0177" source="CVE"/>
	<description>
	nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows attackers to cause a denial of service (kernel crash) via a buffer overflow.
	</description>
 </metadata>
<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0179</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0179" source="CVE"/>
	<description>
	Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.
	</description>
 </metadata>
<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0198</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0198" source="CVE"/>
	<description>
	A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users.
	</description>
 </metadata>
<!-- ec6cc69bcd2bac2e8285ff85b1027168 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032776" comment="imap less than 2002e-92.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0202</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0202" source="CVE"/>
	<description>
	Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.
	</description>
 </metadata>
<!-- 98f5b90c27d1ba5c76b51671dbbdb8bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030491" comment="mailman less than 2.1.4-83.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0209</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0209" source="CVE"/>
	<description>
	Netfilter in Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via crafted IP packet fragments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
		</criteria>
	</criteria>
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0210</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210" source="CVE"/>
	<description>
	Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
		</criteria>
	</criteria>
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0211</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0211" source="CVE"/>
	<description>
	Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter.
	</description>
 </metadata>
<!-- 2121acad3e298802edbe172432353179 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032777" comment="squid less than 2.5.STABLE5-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0227</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0227" source="CVE"/>
	<description>
	PostgreSQL (pgsql) 7.4.x, 7.2.x, and other versions allows local users to load arbitrary shared libraries and execute code via the LOAD extension.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032778" comment="postgresql-libs-32bit less than 9-200506061933"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032779" comment="postgresql-libs-32bit less than 9-200506062151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032780" comment="postgresql-libs-64bit less than 9-200506062057"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032781" comment="postgresql-libs-x86 less than 9-200506061918"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032782" comment="postgresql-libs-32bit less than 9-200504131658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032783" comment="postgresql-libs-32bit less than 9-200504132031"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032784" comment="postgresql-libs-64bit less than 9-200504131529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032785" comment="postgresql-libs-x86 less than 9-200504131636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0241</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0241" source="CVE"/>
	<description>
	The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2121acad3e298802edbe172432353179 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032777" comment="squid less than 2.5.STABLE5-42.27"/>
	</criteria>
	<!-- 46d04b64d752063540e49f5a56c6f3c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032786" comment="squid less than 2.5.STABLE5-42.30"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0244</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0244" source="CVE"/>
	<description>
	PostgreSQL 8.0.0 and earlier allows local users to bypass the EXECUTE permission check for functions by using the CREATE AGGREGATE command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032778" comment="postgresql-libs-32bit less than 9-200506061933"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032779" comment="postgresql-libs-32bit less than 9-200506062151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032780" comment="postgresql-libs-64bit less than 9-200506062057"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032781" comment="postgresql-libs-x86 less than 9-200506061918"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032782" comment="postgresql-libs-32bit less than 9-200504131658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032783" comment="postgresql-libs-32bit less than 9-200504132031"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032784" comment="postgresql-libs-64bit less than 9-200504131529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032785" comment="postgresql-libs-x86 less than 9-200504131636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0245</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0245" source="CVE"/>
	<description>
	Buffer overflow in gram.y for PostgreSQL 8.0.0 and earlier may allow attackers to execute arbitrary code via a large number of arguments to a refcursor function (gram.y), which leads to a heap-based buffer overflow, a different vulnerability than CVE-2005-0247.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032778" comment="postgresql-libs-32bit less than 9-200506061933"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032779" comment="postgresql-libs-32bit less than 9-200506062151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032780" comment="postgresql-libs-64bit less than 9-200506062057"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032781" comment="postgresql-libs-x86 less than 9-200506061918"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032782" comment="postgresql-libs-32bit less than 9-200504131658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032783" comment="postgresql-libs-32bit less than 9-200504132031"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032784" comment="postgresql-libs-64bit less than 9-200504131529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032785" comment="postgresql-libs-x86 less than 9-200504131636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0246</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0246" source="CVE"/>
	<description>
	The intagg contrib module for PostgreSQL 8.0.0 and earlier allows attackers to cause a denial of service (crash) via crafted arrays.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032778" comment="postgresql-libs-32bit less than 9-200506061933"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032779" comment="postgresql-libs-32bit less than 9-200506062151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032780" comment="postgresql-libs-64bit less than 9-200506062057"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032781" comment="postgresql-libs-x86 less than 9-200506061918"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032782" comment="postgresql-libs-32bit less than 9-200504131658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032783" comment="postgresql-libs-32bit less than 9-200504132031"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032784" comment="postgresql-libs-64bit less than 9-200504131529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032785" comment="postgresql-libs-x86 less than 9-200504131636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0247</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0247" source="CVE"/>
	<description>
	Multiple buffer overflows in gram.y for PostgreSQL 8.0.1 and earlier may allow attackers to execute arbitrary code via (1) a large number of variables in a SQL statement being handled by the read_sql_construct function, (2) a large number of INTO variables in a SELECT statement being handled by the make_select_stmt function, (3) a large number of arbitrary variables in a SELECT statement being handled by the make_select_stmt function, and (4) a large number of INTO variables in a FETCH statement being handled by the make_fetch_stmt function, a different set of vulnerabilities than CVE-2005-0245.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032778" comment="postgresql-libs-32bit less than 9-200506061933"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032779" comment="postgresql-libs-32bit less than 9-200506062151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032780" comment="postgresql-libs-64bit less than 9-200506062057"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032781" comment="postgresql-libs-x86 less than 9-200506061918"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
		</criteria>
	</criteria>
	<!-- e782a2a7e7df8fe7a4f54f1fa8172438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030501" comment="postgresql-contrib less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030502" comment="postgresql-devel less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030503" comment="postgresql-docs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032782" comment="postgresql-libs-32bit less than 9-200504131658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032783" comment="postgresql-libs-32bit less than 9-200504132031"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032784" comment="postgresql-libs-64bit less than 9-200504131529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032785" comment="postgresql-libs-x86 less than 9-200504131636"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030504" comment="postgresql-libs less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030505" comment="postgresql-pl less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030506" comment="postgresql-server less than 7.4.7-0.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030507" comment="postgresql less than 7.4.7-0.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0366</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0366" source="CVE"/>
	<description>
	The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
	</description>
 </metadata>
<!-- 91bd5b75ab1218a3ee7853871ac831ce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030510" comment="gpg less than 1.2.4-68.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0373</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0373" source="CVE"/>
	<description>
	Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 231841f94b974632df612072f02006f2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032787" comment="cyrus-sasl-32bit less than 9-200502182129"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032788" comment="cyrus-sasl-32bit less than 9-200502182158"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032789" comment="cyrus-sasl-64bit less than 9-200502182226"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032790" comment="cyrus-sasl-x86 less than 9-200502182119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030511" comment="cyrus-sasl less than 2.1.18-33.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0384</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0384" source="CVE"/>
	<description>
	Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0400</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0400" source="CVE"/>
	<description>
	The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 012927c610add3677c52ec3a28a1648d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 309fc14e1d18412dbf174319b55459e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032791" comment="kernel-s390x less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 68c69c48914f4449e711808448aefd2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032792" comment="kernel-iseries64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032793" comment="kernel-pmac64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032794" comment="kernel-pseries64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 8a7a62bd2689c5729cb258075912cd07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032795" comment="kernel-s390 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 928c182f4ce54092ec84d122124335ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032796" comment="kernel-64k-pagesize less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032797" comment="kernel-debug less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032798" comment="kernel-sn2 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- d616efaaa3764b063cc5bd3d6d09c89e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030518" comment="kernel-bigsmp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032797" comment="kernel-debug less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032799" comment="kernel-um less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032800" comment="um-host-install-initrd less than 1.0-48.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032801" comment="um-host-kernel less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0446</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0446" source="CVE"/>
	<description>
	Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure.
	</description>
 </metadata>
<!-- 46d04b64d752063540e49f5a56c6f3c3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032786" comment="squid less than 2.5.STABLE5-42.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0449</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449" source="CVE"/>
	<description>
	The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
		</criteria>
	</criteria>
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0468</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0468" source="CVE"/>
	<description>
	Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b1e64e238134069ad4b3519f91102157 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030520" comment="telnet less than 1.1-38.6"/>
	</criteria>
	<!-- c3eba5032aa49dac64765a0316cf948a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032802" comment="heimdal-devel-32bit less than 9-200504071809"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032803" comment="heimdal-devel-32bit less than 9-200504072000"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032804" comment="heimdal-devel-64bit less than 9-200504071906"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030521" comment="heimdal-devel less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032805" comment="heimdal-lib-32bit less than 9-200504071809"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032806" comment="heimdal-lib-32bit less than 9-200504072000"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032807" comment="heimdal-lib-64bit less than 9-200504071906"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032808" comment="heimdal-lib-x86 less than 9-200504071757"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030522" comment="heimdal-lib less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030523" comment="heimdal less than 0.6.1rc3-55.15"/>
		</criteria>
	</criteria>
	<!-- d186f2c228e08c5865db6bb658b39807 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030524" comment="telnet less than 1.1-38.9"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0469</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0469" source="CVE"/>
	<description>
	Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b1e64e238134069ad4b3519f91102157 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030520" comment="telnet less than 1.1-38.6"/>
	</criteria>
	<!-- c3eba5032aa49dac64765a0316cf948a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032802" comment="heimdal-devel-32bit less than 9-200504071809"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032803" comment="heimdal-devel-32bit less than 9-200504072000"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032804" comment="heimdal-devel-64bit less than 9-200504071906"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030521" comment="heimdal-devel less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032805" comment="heimdal-lib-32bit less than 9-200504071809"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032806" comment="heimdal-lib-32bit less than 9-200504072000"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032807" comment="heimdal-lib-64bit less than 9-200504071906"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032808" comment="heimdal-lib-x86 less than 9-200504071757"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030522" comment="heimdal-lib less than 0.6.1rc3-55.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030523" comment="heimdal less than 0.6.1rc3-55.15"/>
		</criteria>
	</criteria>
	<!-- d186f2c228e08c5865db6bb658b39807 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030524" comment="telnet less than 1.1-38.9"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0488</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488" source="CVE"/>
	<description>
	Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow remote malicious Telnet servers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command.
	</description>
 </metadata>
<!-- d186f2c228e08c5865db6bb658b39807 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030524" comment="telnet less than 1.1-38.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0504</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0504" source="CVE"/>
	<description>
	Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
		</criteria>
	</criteria>
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0524</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0524" source="CVE"/>
	<description>
	The php_handle_iff function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a -8 size value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 8e92be327165b504dec328c05ca4220b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032678" comment="mod_php4-servlet less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b0cc027d40188c4f2c516845c31cc69f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- bb15f54cd03e743f9f9dd09ccc912493 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032692" comment="mod_php4-servlet less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- cc880d8594257d1c37f5c5e40549ab75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- eb6734193188e5e67d6f06e03c942de2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
	<!-- ee8460dd87ca30f8864ad2c388d24504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032716" comment="mod_php4-servlet less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0525</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0525" source="CVE"/>
	<description>
	The php_next_marker function in image.c for PHP 4.2.2, 4.3.9, 4.3.10 and 5.0.3, as reachable by the getimagesize PHP function, allows remote attackers to cause a denial of service (infinite loop) via a JPEG image with an invalid marker value, which causes a negative length value to be passed to php_stream_seek.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 8e92be327165b504dec328c05ca4220b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032678" comment="mod_php4-servlet less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b0cc027d40188c4f2c516845c31cc69f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- bb15f54cd03e743f9f9dd09ccc912493 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032692" comment="mod_php4-servlet less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- cc880d8594257d1c37f5c5e40549ab75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- eb6734193188e5e67d6f06e03c942de2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
	<!-- ee8460dd87ca30f8864ad2c388d24504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032707" comment="apache-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032708" comment="apache2-mod_php4 less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032709" comment="mod_php4-core less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032716" comment="mod_php4-servlet less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032710" comment="php4-devel less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032711" comment="php4-fastcgi less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032712" comment="php4-imap less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032713" comment="php4-mysql less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032714" comment="php4-session less than 4.3.4-43.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032715" comment="php4-sysvshm less than 4.3.4-43.28"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0529</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0529" source="CVE"/>
	<description>
	Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
		</criteria>
	</criteria>
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0530</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0530" source="CVE"/>
	<description>
	Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 235e46b936ede0d09e4a5a543a8f2587 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032564" comment="drbd less than 0.7.5-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032565" comment="km_drbd less than 0.7.5-0.16"/>
		</criteria>
	</criteria>
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0532</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0532" source="CVE"/>
	<description>
	The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4, when running on 64-bit architectures, may allow local users to trigger a buffer overflow as a result of casting discrepancies between size_t and int data types.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2558830537429cdedb543926fd6344a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 33bbbc88aace49aa6b5ad80876cc4083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032566" comment="kernel-64k-pagesize less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032568" comment="kernel-sn2 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 54a1f3c286aab229c33a01a912db9ffa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030421" comment="kernel-bigsmp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032567" comment="kernel-debug less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032569" comment="kernel-um less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032570" comment="um-host-install-initrd less than 1.0-48.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032571" comment="um-host-kernel less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- 6a60dcc7566d6e55e403322b85680b5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032572" comment="kernel-s390 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- aa4e2819d48d9123020c49d010c105a9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032573" comment="kernel-s390x less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
	<!-- b47839236d4235af750bf0cf0143b9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030417" comment="kernel-default less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032574" comment="kernel-iseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032575" comment="kernel-pmac64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032576" comment="kernel-pseries64 less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030418" comment="kernel-smp less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030419" comment="kernel-source less than 2.6.5-7.151"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030420" comment="kernel-syms less than 2.6.5-7.151"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0605</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0605" source="CVE"/>
	<description>
	scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
	</description>
 </metadata>
<!-- da039ce086e1ed3aac07762982d8569f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032809" comment="XFree86-libs-32bit less than 9-200504020902"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032810" comment="XFree86-libs-32bit less than 9-200504020922"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032811" comment="XFree86-libs-64bit less than 9-200504020324"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032812" comment="XFree86-libs-x86 less than 9-200504021401"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030525" comment="XFree86-libs less than 4.3.99.902-43.42.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0626</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0626" source="CVE"/>
	<description>
	Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies.
	</description>
 </metadata>
<!-- 376d684bc4c52e058376c0b2c1f41fd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032813" comment="squid less than 2.5.STABLE5-42.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0664</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0664" source="CVE"/>
	<description>
	Buffer overflow in the EXIF library (libexif) 0.6.9 does not properly validate the structure of the EXIF tags, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a JPEG image with a crafted EXIF tag.
	</description>
 </metadata>
<!-- d8cf9a498a682c8218818f0af83739a7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030526" comment="libexif less than 0.5.12-118.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0699</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0699" source="CVE"/>
	<description>
	Multiple buffer overflows in the dissect_a11_radius function in the CDMA A11 (3G-A11) dissector (packet-3g-a11.c) for Ethereal 0.10.9 and earlier allow remote attackers to execute arbitrary code via RADIUS authentication packets with large length values.
	</description>
 </metadata>
<!-- 04002f442555d12065ebb4ba411fe086 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0706</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0706" source="CVE"/>
	<description>
	Buffer overflow in discdb.c for grip 3.1.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing the cddb lookup to return more matches than expected.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6e8b9da54a654fd68b754c2b999808d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032424" comment="gnome-vfs less than 1.0.5-806.7"/>
	</criteria>
	<!-- a9b2b8c3a049831dfe42a9cc69112c52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032425" comment="gnome-vfs2-32bit less than 9-200504131658"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032426" comment="gnome-vfs2-32bit less than 9-200504132031"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032427" comment="gnome-vfs2-64bit less than 9-200504131529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032428" comment="gnome-vfs2-doc less than 2.4.2-68.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032429" comment="gnome-vfs2 less than 2.4.2-68.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0709</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0709" source="CVE"/>
	<description>
	MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit.
	</description>
 </metadata>
<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0710</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0710" source="CVE"/>
	<description>
	MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function.
	</description>
 </metadata>
<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0711</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0711" source="CVE"/>
	<description>
	MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.
	</description>
 </metadata>
<!-- 83b0f5c39630e68ca3757f1fa7fb1b42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030424" comment="mysql-Max less than 4.0.18-32.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030425" comment="mysql less than 4.0.18-32.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0718</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0718" source="CVE"/>
	<description>
	Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 376d684bc4c52e058376c0b2c1f41fd8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032813" comment="squid less than 2.5.STABLE5-42.38"/>
	</criteria>
	<!-- fce96418deb2ca446635af24ff7e4a01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032814" comment="squid less than 2.5.STABLE5-42.33"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0739</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0739" source="CVE"/>
	<description>
	The IAPP dissector (packet-iapp.c) for Ethereal 0.9.1 to 0.10.9 does not properly use certain routines for formatting strings, which could leave it vulnerable to buffer overflows, as demonstrated using modified length values that are not properly handled by the dissect_pdus and pduval_to_str functions.
	</description>
 </metadata>
<!-- 04002f442555d12065ebb4ba411fe086 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032727" comment="ethereal less than 0.10.3-15.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0749</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0749" source="CVE"/>
	<description>
	The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 012927c610add3677c52ec3a28a1648d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 309fc14e1d18412dbf174319b55459e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032791" comment="kernel-s390x less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 68c69c48914f4449e711808448aefd2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032792" comment="kernel-iseries64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032793" comment="kernel-pmac64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032794" comment="kernel-pseries64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 8a7a62bd2689c5729cb258075912cd07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032795" comment="kernel-s390 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 928c182f4ce54092ec84d122124335ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032796" comment="kernel-64k-pagesize less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032797" comment="kernel-debug less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032798" comment="kernel-sn2 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- d616efaaa3764b063cc5bd3d6d09c89e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030518" comment="kernel-bigsmp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032797" comment="kernel-debug less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032799" comment="kernel-um less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032800" comment="um-host-install-initrd less than 1.0-48.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032801" comment="um-host-kernel less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0836</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0836" source="CVE"/>
	<description>
	Argument injection vulnerability in Java Web Start for J2SE 1.4.2 up to 1.4.2_06 allows untrusted applications to gain privileges via the value parameter of a property tag in a JNLP file.
	</description>
 </metadata>
<!-- b5567e88bcedd66fdf6fc0178b4246a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030529" comment="java2-jre less than 1.4.2-129.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030530" comment="java2 less than 1.4.2-129.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0916</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for IBM POWER</platform>
	</affected>
	<reference ref_id="CVE-2005-0916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0916" source="CVE"/>
	<description>
	AIO in the Linux kernel 2.6.11 on the PPC64 or IA64 architectures with CONFIG_HUGETLB_PAGE enabled allows local users to cause a denial of service (system panic) via a process that executes the io_queue_init function but exits without running io_queue_release, which causes exit_aio and is_hugepage_only_range to fail.
	</description>
 </metadata>
<!-- 76b31821f5458d44e4feaa31a71f7c0d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032815" comment="kernel-iseries64 less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032816" comment="kernel-pmac64 less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032817" comment="kernel-pseries64 less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20050961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-0961</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-0961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0961" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Horde 3.0.4 before 3.0.4-RC2 allows remote attackers to inject arbitrary web script or HTML via the parent frame title.
	</description>
 </metadata>
<!-- 54f873ef2a89530d36da39dfe7cfdee6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032818" comment="horde less than 2.2.5-63.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1041</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1041" source="CVE"/>
	<description>
	The fib_seq_start function in fib_hash.c in Linux kernel allows local users to cause a denial of service (system crash) via /proc/net/route.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1042</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1042" source="CVE"/>
	<description>
	Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 8e92be327165b504dec328c05ca4220b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032678" comment="mod_php4-servlet less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b0cc027d40188c4f2c516845c31cc69f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- bb15f54cd03e743f9f9dd09ccc912493 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032692" comment="mod_php4-servlet less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- cc880d8594257d1c37f5c5e40549ab75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1043</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1043" source="CVE"/>
	<description>
	exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 8e92be327165b504dec328c05ca4220b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032678" comment="mod_php4-servlet less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b0cc027d40188c4f2c516845c31cc69f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- bb15f54cd03e743f9f9dd09ccc912493 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032692" comment="mod_php4-servlet less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
	<!-- cc880d8594257d1c37f5c5e40549ab75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032689" comment="apache-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032690" comment="apache2-mod_php4 less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032691" comment="mod_php4-core less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032693" comment="php4-devel less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032694" comment="php4-exif less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032695" comment="php4-fastcgi less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032696" comment="php4-imap less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032697" comment="php4-mysql less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032698" comment="php4-session less than 4.3.4-43.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032699" comment="php4-sysvshm less than 4.3.4-43.31"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1046</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1046" source="CVE"/>
	<description>
	Buffer overflow in the kimgio library for KDE 3.4.0 allows remote attackers to execute arbitrary code via a crafted PCX image file.
	</description>
 </metadata>
<!-- 8b08d6b6387b6b5534e53f6ab4fbae74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032831" comment="kdelibs3-32bit less than 9-200504222104"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032832" comment="kdelibs3-32bit less than 9-200504222208"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032833" comment="kdelibs3-64bit less than 9-200504222125"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032834" comment="kdelibs3-x86 less than 9-200504222050"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030557" comment="kdelibs3 less than 3.2.1-44.49"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1111</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111" source="CVE"/>
	<description>
	Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by cpio after the decompression is complete.
	</description>
 </metadata>
<!-- 538e74e078656d72bf43e00c836ab28a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030558" comment="cpio less than 2.5-324.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1127</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1127" source="CVE"/>
	<description>
	Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
	</description>
 </metadata>
<!-- 365f6d024c27925f04eae1f12da725f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032835" comment="perl-Net-Server less than 0.87-29.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1151</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1151" source="CVE"/>
	<description>
	qpopper 4.0.5 and earlier does not properly drop privileges before processing certain user-supplied files, which allows local users to overwrite or create arbitrary files as root.
	</description>
 </metadata>
<!-- 6c73963608b172bac22ae461783e4f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030559" comment="qpopper less than 4.0.5-175.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1152</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1152" source="CVE"/>
	<description>
	popauth.c in qpopper 4.0.5 and earlier does not properly set the umask, which may cause qpopper to create files with group or world-writable permissions.
	</description>
 </metadata>
<!-- 6c73963608b172bac22ae461783e4f8b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030559" comment="qpopper less than 4.0.5-175.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1229</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1229" source="CVE"/>
	<description>
	Directory traversal vulnerability in cpio 2.6 and earlier allows remote attackers to write to arbitrary directories via a .. (dot dot) in a cpio file.
	</description>
 </metadata>
<!-- 538e74e078656d72bf43e00c836ab28a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030558" comment="cpio less than 2.5-324.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1260</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260" source="CVE"/>
	<description>
	bzip2 allows remote attackers to cause a denial of service (hard drive consumption) via a crafted bzip2 file that causes an infinite loop (a.k.a "decompression bomb").
	</description>
 </metadata>
<!-- 62eba860a1c612912f9af711b282c987 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032836" comment="bzip2-32bit less than 9-200506050833"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032837" comment="bzip2-32bit less than 9-200506051044"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032838" comment="bzip2-64bit less than 9-200506050508"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032839" comment="bzip2-x86 less than 9-200506051012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030561" comment="bzip2 less than 1.0.2-346.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1263</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263" source="CVE"/>
	<description>
	The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 012927c610add3677c52ec3a28a1648d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 309fc14e1d18412dbf174319b55459e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032791" comment="kernel-s390x less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 68c69c48914f4449e711808448aefd2b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032792" comment="kernel-iseries64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032793" comment="kernel-pmac64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032794" comment="kernel-pseries64 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 8a7a62bd2689c5729cb258075912cd07 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032795" comment="kernel-s390 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- 928c182f4ce54092ec84d122124335ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032796" comment="kernel-64k-pagesize less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032797" comment="kernel-debug less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032798" comment="kernel-sn2 less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
	<!-- d616efaaa3764b063cc5bd3d6d09c89e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030518" comment="kernel-bigsmp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032797" comment="kernel-debug less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030514" comment="kernel-default less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030515" comment="kernel-smp less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030516" comment="kernel-source less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030517" comment="kernel-syms less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032799" comment="kernel-um less than 2.6.5-7.155.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032800" comment="um-host-install-initrd less than 1.0-48.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032801" comment="um-host-kernel less than 2.6.5-7.155.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1268</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268" source="CVE"/>
	<description>
	Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
	</description>
 </metadata>
<!-- 7dde1155c50a2611fa6b1c72b78ea3bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032840" comment="apache2-devel less than 2.0.49-27.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032841" comment="apache2-doc less than 2.0.49-27.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032842" comment="apache2-example-pages less than 2.0.49-27.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032843" comment="apache2-prefork less than 2.0.49-27.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032844" comment="apache2-worker less than 2.0.49-27.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032845" comment="apache2 less than 2.0.49-27.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030563" comment="libapr0 less than 2.0.49-27.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1278</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1278" source="CVE"/>
	<description>
	The isis_print function, as called by isoclns_print, in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a zero length, as demonstrated using a GRE packet.
	</description>
 </metadata>
<!-- bd6998678d5bd996ff251f8fe2d75bfa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030564" comment="tcpdump less than 3.8.1-49.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1279</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1279" source="CVE"/>
	<description>
	tcpdump 3.8.3 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted (1) BGP packet, which is not properly handled by RT_ROUTING_INFO, or (2) LDP packet, which is not properly handled by the ldp_print function.
	</description>
 </metadata>
<!-- bd6998678d5bd996ff251f8fe2d75bfa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030564" comment="tcpdump less than 3.8.1-49.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1280</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1280" source="CVE"/>
	<description>
	The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a denial of service (infinite loop) via a crafted RSVP packet of length 4.
	</description>
 </metadata>
<!-- bd6998678d5bd996ff251f8fe2d75bfa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030564" comment="tcpdump less than 3.8.1-49.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1345</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1345" source="CVE"/>
	<description>
	Squid 2.5.STABLE9 and earlier does not trigger a fatal error when it identifies missing or invalid ACLs in the http_access configuration, which could lead to less restrictive ACLs than intended by the administrator.
	</description>
 </metadata>
<!-- 376d684bc4c52e058376c0b2c1f41fd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032813" comment="squid less than 2.5.STABLE5-42.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1349</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1349" source="CVE"/>
	<description>
	Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.
	</description>
 </metadata>
<!-- 3394152761afa0be59edcbf5c6a648a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032846" comment="perl-Convert-UUlib less than 1.0-25.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1409</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1409" source="CVE"/>
	<description>
	PostgreSQL 7.3.x through 8.0.x gives public EXECUTE access to certain character conversion functions, which allows unprivileged users to call those functions with malicious values, with unknown impact, aka the "Character conversion vulnerability."
	</description>
 </metadata>
<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032778" comment="postgresql-libs-32bit less than 9-200506061933"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032779" comment="postgresql-libs-32bit less than 9-200506062151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032780" comment="postgresql-libs-64bit less than 9-200506062057"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032781" comment="postgresql-libs-x86 less than 9-200506061918"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1410</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1410" source="CVE"/>
	<description>
	The tsearch2 module in PostgreSQL 7.4 through 8.0.x declares the (1) dex_init, (2) snb_en_init, (3) snb_ru_init, (4) spell_init, and (5) syn_init functions as "internal" even when they do not take an internal argument, which allows attackers to cause a denial of service (application crash) and possibly have other impacts via SQL commands that call other functions that accept internal arguments.
	</description>
 </metadata>
<!-- 8522a86bfa9ca66f0b82fb3eb0042bae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030494" comment="postgresql-contrib less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030495" comment="postgresql-devel less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030496" comment="postgresql-docs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032778" comment="postgresql-libs-32bit less than 9-200506061933"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032779" comment="postgresql-libs-32bit less than 9-200506062151"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032780" comment="postgresql-libs-64bit less than 9-200506062057"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032781" comment="postgresql-libs-x86 less than 9-200506061918"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030497" comment="postgresql-libs less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030498" comment="postgresql-pl less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030499" comment="postgresql-server less than 7.4.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030500" comment="postgresql less than 7.4.8-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1431</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1431" source="CVE"/>
	<description>
	The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f93152df6a15f25149d78610657d2b17 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030565" comment="libredcarpet-python less than 2.4.8-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030566" comment="libredcarpet-tools less than 2.4.8-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030567" comment="libredcarpet less than 2.4.8-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030570" comment="libsoup-devel less than 2.2.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030571" comment="libsoup less than 2.2.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030572" comment="rcd-devel less than 2.4.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030573" comment="rcd-modules-devel less than 2.4.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030574" comment="rcd-modules less than 2.4.8-0.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030575" comment="rcd less than 2.4.8-0.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030576" comment="red-carpet less than 2.4.4-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030577" comment="rug less than 2.4.8-0.2"/>
		</criteria>
	</criteria>
	<!-- facaf52555b6fe0ef2cc9af986881d24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030578" comment="gnutls-devel less than 1.0.8-26.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030579" comment="gnutls less than 1.0.8-26.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1454</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1454" source="CVE"/>
	<description>
	SQL injection vulnerability in the radius_xlat function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote authenticated users to execute arbitrary SQL commands via (1) group_membership_query, (2) simul_count_query, or (3) simul_verify_query configuration entries.
	</description>
 </metadata>
<!-- ceeefe77f6de6044ebe6a99f22fad957 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032847" comment="freeradius less than 0.9.3-106.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1455</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1455" source="CVE"/>
	<description>
	Buffer overflow in the sql_escape_func function in the SQL module for FreeRADIUS 1.0.2 and earlier allows remote attackers to cause a denial of service (crash).
	</description>
 </metadata>
<!-- ceeefe77f6de6044ebe6a99f22fad957 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032847" comment="freeradius less than 0.9.3-106.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1519</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1519" source="CVE"/>
	<description>
	Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.
	</description>
 </metadata>
<!-- 376d684bc4c52e058376c0b2c1f41fd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032813" comment="squid less than 2.5.STABLE5-42.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1544</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1544" source="CVE"/>
	<description>
	Stack-based buffer overflow in libTIFF before 3.7.2 allows remote attackers to execute arbitrary code via a TIFF file with a malformed BitsPerSample tag.
	</description>
 </metadata>
<!-- 48fb8d157fcd5511278ed1129c23ec5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032848" comment="libtiff-32bit less than 9-200505110332"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032849" comment="libtiff-32bit less than 9-200505110425"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032850" comment="libtiff-64bit less than 9-200505110156"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032851" comment="libtiff-x86 less than 9-200505110526"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030580" comment="libtiff less than 3.6.1-38.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1625</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1625" source="CVE"/>
	<description>
	Stack-based buffer overflow in the UnixAppOpenFilePerform function in Adobe Reader 5.0.9 and 5.0.10 for Unix allows remote attackers to execute arbitrary code via a PDF document with a long /Filespec tag.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4e7ef03dbccdffc282ee127ce2ec5ff4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030581" comment="acroread less than 7.0.0-5.4"/>
	</criteria>
	<!-- 7c1a0c9c884f08dfefd2f3ca9e85e5d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030581" comment="acroread less than 7.0.0-5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032852" comment="curl-32bit less than 9-200507121454"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032853" comment="glibc-locale-32bit less than 9-200507121454"/>
		</criteria>
	</criteria>
	<!-- 8440156f365603ca364878d284ec4e4c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030581" comment="acroread less than 7.0.0-5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032854" comment="atk-32bit less than 9-200507121454"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032855" comment="atk-doc less than 1.4.1-128.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032856" comment="atk less than 1.4.1-128.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032852" comment="curl-32bit less than 9-200507121454"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032857" comment="glib2-32bit less than 9-200507121454"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032858" comment="glib2 less than 2.2.3-117.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032853" comment="glibc-locale-32bit less than 9-200507121454"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032859" comment="gtk2-32bit less than 9-200507121454"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032860" comment="gtk2 less than 2.2.4-125.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032861" comment="pango-32bit less than 9-200507121454"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032862" comment="pango less than 1.2.5-174.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1686</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1686" source="CVE"/>
	<description>
	Format string vulnerability in gedit 2.10.2 may allow attackers to cause a denial of service (application crash) via a bin file with format string specifiers in the filename.  NOTE: while this issue is triggered on the command line by the gedit user, it has been reported that web browsers and email clients could be configured to provide a file name as an argument to gedit, so there is a valid attack that crosses security boundaries.
	</description>
 </metadata>
<!-- 20b4d6e20cabe54a0978ec88596c0a43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032863" comment="gedit less than 2.4.1-52.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1765</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2005-1765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1765" source="CVE"/>
	<description>
	syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.
	</description>
 </metadata>
<!-- e10ca3709a9019caf2c4ceda142f2980 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1768</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
	</affected>
	<reference ref_id="CVE-2005-1768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1768" source="CVE"/>
	<description>
	Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 763807d02c867cd119d326d0b53c0d9b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030619" comment="kernel-default less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032864" comment="kernel-iseries64 less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032865" comment="kernel-pmac64 less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032866" comment="kernel-pseries64 less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030620" comment="kernel-smp less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030621" comment="kernel-source less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030622" comment="kernel-syms less than 2.6.5-7.193"/>
		</criteria>
	</criteria>
	<!-- 78dc1762b6e16a8b7785f2a942b69b14 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032867" comment="kernel-s390x less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030621" comment="kernel-source less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030622" comment="kernel-syms less than 2.6.5-7.193"/>
		</criteria>
	</criteria>
	<!-- 988b22ccd62464404abb6edf9e96f50a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032868" comment="kernel-64k-pagesize less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032869" comment="kernel-debug less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030619" comment="kernel-default less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032870" comment="kernel-sn2 less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030621" comment="kernel-source less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030622" comment="kernel-syms less than 2.6.5-7.193"/>
		</criteria>
	</criteria>
	<!-- b3d76bae3ffcf76948bbfbfd5dbe2685 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030619" comment="kernel-default less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030620" comment="kernel-smp less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030621" comment="kernel-source less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030622" comment="kernel-syms less than 2.6.5-7.193"/>
		</criteria>
	</criteria>
	<!-- fb8b450f9b2a10557476ea65ef2cce6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032871" comment="kernel-s390 less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030621" comment="kernel-source less than 2.6.5-7.193"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030622" comment="kernel-syms less than 2.6.5-7.193"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1848" source="CVE"/>
	<description>
	The dhcpcd DHCP client before 1.3.22 allows remote attackers to cause a denial of service (daemon crash) via unknown vectors that cause an out-of-bounds memory read.
	</description>
 </metadata>
<!-- 98183fdd3d8a3a7c07861653644147d2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030623" comment="dhcpcd less than 1.3.22pl4-193.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1849</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849" source="CVE"/>
	<description>
	inftrees.h in zlib 1.2.2 allows remote attackers to cause a denial of service (application crash) via an invalid file that causes a large dynamic tree to be produced.
	</description>
 </metadata>
<!-- 3c0be2ab654cac1e3ab58a80d1e62102 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032872" comment="zlib-32bit less than 9-200507230921"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032873" comment="zlib-32bit less than 9-200507231356"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032874" comment="zlib-64bit less than 9-200507230446"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032875" comment="zlib-devel-32bit less than 9-200507230921"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032876" comment="zlib-devel-32bit less than 9-200507231356"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032877" comment="zlib-devel-64bit less than 9-200507230446"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030624" comment="zlib-devel less than 1.2.1-70.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032878" comment="zlib-x86 less than 9-200507231603"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030625" comment="zlib less than 1.2.1-70.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1918</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1918" source="CVE"/>
	<description>
	The original patch for a GNU tar directory traversal vulnerability (CVE-2002-0399) in Red Hat Enterprise Linux 3 and 2.1 uses an "incorrect optimization" that allows user-assisted attackers to overwrite arbitrary files via a crafted tar file, probably involving "/../" sequences with a leading "/".
	</description>
 </metadata>
<!-- cffcc0146fa6ba2fd6d7036a5d1643b8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030402" comment="tar less than 1.13.25-325.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1920</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1920" source="CVE"/>
	<description>
	The (1) Kate and (2) Kwrite applications in KDE KDE 3.2.x through 3.4.0 do not properly set the same permissions on the backup file as were set on the original file, which could allow local users and possibly remote attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- 882cebd6cc237278167dea9c852551c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032879" comment="kdelibs3-32bit less than 9-200507230921"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032880" comment="kdelibs3-32bit less than 9-200507231356"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032881" comment="kdelibs3-64bit less than 9-200507230446"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030628" comment="kdelibs3-devel less than 3.2.1-44.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032882" comment="kdelibs3-x86 less than 9-200507231603"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030629" comment="kdelibs3 less than 3.2.1-44.55"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1921</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1921" source="CVE"/>
	<description>
	Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 8e92be327165b504dec328c05ca4220b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032678" comment="mod_php4-servlet less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b0cc027d40188c4f2c516845c31cc69f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032675" comment="apache-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032676" comment="apache2-mod_php4 less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032677" comment="mod_php4-core less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032679" comment="php4-devel less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032680" comment="php4-exif less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032681" comment="php4-fastcgi less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032682" comment="php4-imap less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032683" comment="php4-mysql less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032684" comment="php4-pear less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032685" comment="php4-session less than 4.3.4-43.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032686" comment="php4-sysvshm less than 4.3.4-43.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1974</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1974" source="CVE"/>
	<description>
	Unspecified vulnerability in Java 2 Platform, Standard Edition (J2SE) 5.0 and 5.0 Update 1 and J2SE 1.4.2 up to 1.4.2_07, as used in multiple products and platforms including (1) HP-UX and (2) APC PowerChute, allows applications to assign permissions to themselves and gain privileges.
	</description>
 </metadata>
<!-- b5567e88bcedd66fdf6fc0178b4246a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030529" comment="java2-jre less than 1.4.2-129.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030530" comment="java2 less than 1.4.2-129.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1992</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1992" source="CVE"/>
	<description>
	The XMLRPC server in utils.rb for the ruby library (libruby) 1.8 sets an invalid default value that prevents "security protection" using handlers, which allows remote attackers to execute arbitrary commands.
	</description>
 </metadata>
<!-- 3f8741eeb1c46c850b9afea1439732d4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030630" comment="ruby less than 1.8.1-42.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1993</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1993" source="CVE"/>
	<description>
	Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.
	</description>
 </metadata>
<!-- 67c43cf74d430d2dd1f2caefb768a6cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030631" comment="sudo less than 1.6.7p5-117.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2040</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2040" source="CVE"/>
	<description>
	Multiple buffer overflows in the getterminaltype function in telnetd for Heimdal before 0.6.5 may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2005-0468 and CVE-2005-0469.
	</description>
 </metadata>
<!-- 7a1bd2904b1dafed2c6c5e32debc62d9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030632" comment="heimdal less than 0.6.1rc3-55.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2069</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2069" source="CVE"/>
	<description>
	pam_ldap and nss_ldap, when used with OpenLDAP and connecting to a slave using TLS, does not use TLS for the subsequent connection if the client is referred to a master, which may cause a password to be sent in cleartext and allows remote attackers to sniff the password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5d12991ea3c6ae75260aec8c7091e137 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032883" comment="openldap2-client-32bit less than 9-200508260256"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032884" comment="openldap2-client-32bit less than 9-200508260820"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032885" comment="openldap2-client-64bit less than 9-200508252329"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032886" comment="openldap2-client-x86 less than 9-200508261518"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030633" comment="openldap2-client less than 2.2.24-4.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032887" comment="openldap2-devel-32bit less than 9-200508260256"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032888" comment="openldap2-devel-32bit less than 9-200508260820"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032889" comment="openldap2-devel-64bit less than 9-200508252329"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030634" comment="openldap2-devel less than 2.2.24-4.8"/>
		</criteria>
	</criteria>
	<!-- 9a1cbfa4630090b717a1c1e9d550d07a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032890" comment="pam_ldap-32bit less than 9-200508260256"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032891" comment="pam_ldap-32bit less than 9-200508260820"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032892" comment="pam_ldap-64bit less than 9-200508252329"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032893" comment="pam_ldap-x86 less than 9-200508261518"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030635" comment="pam_ldap less than 169-28.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2088</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088" source="CVE"/>
	<description>
	The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4df2491f791b149e704e9a044667da8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032894" comment="apache less than 1.3.29-71.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032895" comment="mod_ssl less than 2.8.16-71.18"/>
		</criteria>
	</criteria>
	<!-- 7dde1155c50a2611fa6b1c72b78ea3bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032840" comment="apache2-devel less than 2.0.49-27.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032841" comment="apache2-doc less than 2.0.49-27.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032842" comment="apache2-example-pages less than 2.0.49-27.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032843" comment="apache2-prefork less than 2.0.49-27.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032844" comment="apache2-worker less than 2.0.49-27.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032845" comment="apache2 less than 2.0.49-27.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030563" comment="libapr0 less than 2.0.49-27.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2090</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2090" source="CVE"/>
	<description>
	Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032896" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032897" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032898" comment="jakarta-tomcat-doc less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032899" comment="jakarta-tomcat-examples less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2096</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096" source="CVE"/>
	<description>
	zlib 1.2 and later versions allows remote attackers to cause a denial of service (crash) via a crafted compressed stream with an incomplete code description of a length greater than 1, which leads to a buffer overflow, as demonstrated using a crafted PNG file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c0be2ab654cac1e3ab58a80d1e62102 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032872" comment="zlib-32bit less than 9-200507230921"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032873" comment="zlib-32bit less than 9-200507231356"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032874" comment="zlib-64bit less than 9-200507230446"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032875" comment="zlib-devel-32bit less than 9-200507230921"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032876" comment="zlib-devel-32bit less than 9-200507231356"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032877" comment="zlib-devel-64bit less than 9-200507230446"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030624" comment="zlib-devel less than 1.2.1-70.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032878" comment="zlib-x86 less than 9-200507231603"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030625" comment="zlib less than 1.2.1-70.12"/>
		</criteria>
	</criteria>
	<!-- 4456a1446341a2b3b1d097cd08c8dbb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032900" comment="zlib-32bit less than 9-200507042222"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032901" comment="zlib-32bit less than 9-200507042327"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032902" comment="zlib-64bit less than 9-200507042200"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032903" comment="zlib-devel-32bit less than 9-200507042222"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032904" comment="zlib-devel-32bit less than 9-200507042327"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032905" comment="zlib-devel-64bit less than 9-200507042200"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030637" comment="zlib-devel less than 1.2.1-70.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032906" comment="zlib-x86 less than 9-200507042203"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030638" comment="zlib less than 1.2.1-70.9"/>
		</criteria>
	</criteria>
	<!-- 5e0c398872bb913989b43ea4a15c84ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030639" comment="perl-Compress-Zlib less than 1.33-30.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2177</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177" source="CVE"/>
	<description>
	Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.
	</description>
 </metadata>
<!-- 03773b86152a9cf5a9cdb80046a8a724 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030640" comment="net-snmp less than 5.1-80.22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2231</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2231" source="CVE"/>
	<description>
	High Availability Linux Project Heartbeat 1.2.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files.
	</description>
 </metadata>
<!-- a1db20e5a30352f1f8c0c51211d4ddd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032907" comment="heartbeat-ldirectord less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032908" comment="heartbeat-pils less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032909" comment="heartbeat-stonith less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032910" comment="heartbeat less than 1.2.5-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2335</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335" source="CVE"/>
	<description>
	Buffer overflow in the POP3 client in Fetchmail before 6.2.5.2 allows remote POP3 servers to cause a denial of service and possibly execute arbitrary code via long UIDL responses.  NOTE: a typo in an advisory accidentally used the wrong CVE identifier for the Fetchmail issue. This is the correct identifier.
	</description>
 </metadata>
<!-- 99a4c8ea19b0741d4fb2cbde545272f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030641" comment="fetchmail less than 6.2.5-49.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2337</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2337" source="CVE"/>
	<description>
	Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
	</description>
 </metadata>
<!-- 65591114d5c671d5d00755c7dc73908d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030642" comment="ruby less than 1.8.1-42.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2360</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2360" source="CVE"/>
	<description>
	Unknown vulnerability in the LDAP dissector in Ethereal 0.8.5 through 0.10.11 allows remote attackers to cause a denial of service (free static memory and application crash) via unknown attack vectors.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2361</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2361" source="CVE"/>
	<description>
	Unknown vulnerability in the (1) AgentX dissector, (2) PER dissector, (3) DOCSIS dissector, (4) SCTP graphs, (5) HTTP dissector, (6) DCERPC, (7) DHCP, (8) RADIUS dissector, (9) Telnet dissector, (10) IS-IS LSP dissector, or (11) NCP dissector in Ethereal 0.8.19 through 0.10.11 allows remote attackers to cause a denial of service (application crash or abort) via unknown attack vectors.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2362</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2362" source="CVE"/>
	<description>
	Unknown vulnerability several dissectors in Ethereal 0.9.0 through 0.10.11 allows remote attackers to cause a denial of service (application crash) by reassembling certain packets.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2363</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2363" source="CVE"/>
	<description>
	Unknown vulnerability in the (1) SMPP dissector, (2) 802.3 dissector, (3) DHCP, (4) MEGACO dissector, or (5) H1 dissector in Ethereal 0.8.15 through 0.10.11 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2364</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2364" source="CVE"/>
	<description>
	Unknown vulnerability in the (1) GIOP dissector, (2) WBXML, or (3) CAMEL dissector in Ethereal 0.8.20 through 0.10.11 allows remote attackers to cause a denial of service (application crash) via certain packets that cause a null pointer dereference.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2365</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2365" source="CVE"/>
	<description>
	Unknown vulnerability in the SMB dissector in Ethereal 0.9.0 through 0.10.11 allows remote attackers to cause a buffer overflow or a denial of service (memory consumption) via unknown attack vectors.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2366</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2366" source="CVE"/>
	<description>
	Unknown vulnerability in the BER dissector in Ethereal 0.10.11 allows remote attackers to cause a denial of service (abort or infinite loop) via unknown attack vectors.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2367</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2367" source="CVE"/>
	<description>
	Format string vulnerability in the proto_item_set_text function in Ethereal 0.9.4 through 0.10.11, as used in multiple dissectors, allows remote attackers to write to arbitrary memory locations and gain privileges via a crafted AFP packet.
	</description>
 </metadata>
<!-- 4603107f282f38907de78feb2a573f2f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032911" comment="ethereal less than 0.10.12-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2456</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456" source="CVE"/>
	<description>
	Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p-&gt;dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock-&gt;sk_policy array.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17b472d8726ee7e9fa73b9a5cdb787ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032912" comment="kernel-s390x less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 603a16d2fd74358e7a2e1c23ac923496 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032913" comment="kernel-64k-pagesize less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032915" comment="kernel-sn2 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 76b31821f5458d44e4feaa31a71f7c0d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032815" comment="kernel-iseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032816" comment="kernel-pmac64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032817" comment="kernel-pseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- a55e12480ef483ba42fdb13c8885422b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032916" comment="kernel-s390 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032917" comment="kernel-um less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032918" comment="um-host-install-initrd less than 1.0-48.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032919" comment="um-host-kernel less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2457</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457" source="CVE"/>
	<description>
	The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17b472d8726ee7e9fa73b9a5cdb787ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032912" comment="kernel-s390x less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 603a16d2fd74358e7a2e1c23ac923496 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032913" comment="kernel-64k-pagesize less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032915" comment="kernel-sn2 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 76b31821f5458d44e4feaa31a71f7c0d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032815" comment="kernel-iseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032816" comment="kernel-pmac64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032817" comment="kernel-pseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- a55e12480ef483ba42fdb13c8885422b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032916" comment="kernel-s390 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032917" comment="kernel-um less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032918" comment="um-host-install-initrd less than 1.0-48.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032919" comment="um-host-kernel less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2458</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458" source="CVE"/>
	<description>
	inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17b472d8726ee7e9fa73b9a5cdb787ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032912" comment="kernel-s390x less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 603a16d2fd74358e7a2e1c23ac923496 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032913" comment="kernel-64k-pagesize less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032915" comment="kernel-sn2 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 76b31821f5458d44e4feaa31a71f7c0d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032815" comment="kernel-iseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032816" comment="kernel-pmac64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032817" comment="kernel-pseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- a55e12480ef483ba42fdb13c8885422b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032916" comment="kernel-s390 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032917" comment="kernel-um less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032918" comment="um-host-install-initrd less than 1.0-48.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032919" comment="um-host-kernel less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2459</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459" source="CVE"/>
	<description>
	The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerbility than CVE-2005-2458.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17b472d8726ee7e9fa73b9a5cdb787ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032912" comment="kernel-s390x less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 603a16d2fd74358e7a2e1c23ac923496 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032913" comment="kernel-64k-pagesize less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032915" comment="kernel-sn2 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 76b31821f5458d44e4feaa31a71f7c0d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032815" comment="kernel-iseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032816" comment="kernel-pmac64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032817" comment="kernel-pseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- a55e12480ef483ba42fdb13c8885422b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032916" comment="kernel-s390 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032917" comment="kernel-um less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032918" comment="um-host-install-initrd less than 1.0-48.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032919" comment="um-host-kernel less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2470</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2470" source="CVE"/>
	<description>
	Buffer overflow in a "core application plug-in" for Adobe Reader 5.1 through 7.0.2 and Acrobat 5.0 through 7.0.2 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 4a061c28380008ffcc1c4f3f50c4c229 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030644" comment="acroread less than 7.0.1-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2471</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471" source="CVE"/>
	<description>
	pstopnm in netpbm does not properly use the "-dSAFER" option when calling Ghostscript to convert a PostScript file into a (1) PBM, (2) PGM, or (3) PNM file, which allows external user-assisted attackers to execute arbitrary commands.
	</description>
 </metadata>
<!-- ed799257235ba3dc80fe0e5578642fc8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030645" comment="libnetpbm less than 1.0.0-618.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030646" comment="netpbm less than 10.11.4-172.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2490</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490" source="CVE"/>
	<description>
	Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2491</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491" source="CVE"/>
	<description>
	Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- b5ee8d570837e8d054b4dc0125fb4447 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032920" comment="python-32bit less than 9-200712110029"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030647" comment="python-32bit less than 9-200712110030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032921" comment="python-64bit less than 9-200712110033"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030648" comment="python-curses less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030649" comment="python-demo less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030650" comment="python-devel less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030651" comment="python-doc-pdf less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030652" comment="python-doc less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030653" comment="python-gdbm less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030654" comment="python-idle less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030655" comment="python-mpz less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030656" comment="python-tk less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032922" comment="python-x86 less than 9-200712110030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030657" comment="python-xml less than 2.3.3-88.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030658" comment="python less than 2.3.3-88.18"/>
		</criteria>
	</criteria>
	<!-- e58d810ac0db99188b131e1a59b6c63e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032923" comment="pcre-32bit less than 9-200508260256"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032924" comment="pcre-32bit less than 9-200508260820"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032925" comment="pcre-64bit less than 9-200508252329"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030659" comment="pcre-devel less than 4.4-109.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032926" comment="pcre-x86 less than 9-200508261518"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030660" comment="pcre less than 4.4-109.4"/>
		</criteria>
	</criteria>
	<!-- f2a372ddb83d6f0e292e5c1e24bd50df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032927" comment="apache2-devel less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032928" comment="apache2-prefork less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032929" comment="apache2-worker less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032930" comment="apache2 less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030661" comment="libapr0 less than 2.0.49-27.34"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2495</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2495" source="CVE"/>
	<description>
	Multiple integer overflows in XFree86 before 4.3.0 allow user-assisted attackers to execute arbitrary code via a crafted pixmap image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 21d7ac2cc55a0ea9ead625bf2538e728 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030662" comment="XFree86-Xvnc less than 4.3.99.902-43.50.3"/>
	</criteria>
	<!-- 3d6df3814d44ff22980e1553b6d66fab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030663" comment="XFree86-server less than 4.3.99.902-43.50.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2498</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2498" source="CVE"/>
	<description>
	Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2e855be5ae7903ca40477ba01d9c9d02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
	<!-- 7f36b0314c2e0cdee069a52ce4289795 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032666" comment="mod_php4-servlet less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 96d092ab1925ede50674a8e6febbc9ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032663" comment="apache-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032664" comment="apache2-mod_php4 less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032665" comment="mod_php4-core less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032667" comment="php4-devel less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032668" comment="php4-exif less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032669" comment="php4-fastcgi less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032670" comment="php4-imap less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032671" comment="php4-mysql less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032672" comment="php4-pear less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032673" comment="php4-session less than 4.3.4-43.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032674" comment="php4-sysvshm less than 4.3.4-43.41"/>
		</criteria>
	</criteria>
	<!-- 981ef108b964d6518c58b160d56e9bcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032652" comment="apache-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032653" comment="apache2-mod_php4 less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032654" comment="mod_php4-core less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032687" comment="mod_php4-servlet less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032655" comment="php4-devel less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032656" comment="php4-exif less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032657" comment="php4-fastcgi less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032658" comment="php4-imap less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032659" comment="php4-mysql less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032660" comment="php4-pear less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032661" comment="php4-session less than 4.3.4-43.44"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032662" comment="php4-sysvshm less than 4.3.4-43.44"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2555</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555" source="CVE"/>
	<description>
	Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17b472d8726ee7e9fa73b9a5cdb787ff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032912" comment="kernel-s390x less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 603a16d2fd74358e7a2e1c23ac923496 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032913" comment="kernel-64k-pagesize less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032915" comment="kernel-sn2 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- 76b31821f5458d44e4feaa31a71f7c0d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032815" comment="kernel-iseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032816" comment="kernel-pmac64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032817" comment="kernel-pseries64 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- a55e12480ef483ba42fdb13c8885422b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032916" comment="kernel-s390 less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- cc4cac8da682a37bd29679876758bccf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030643" comment="kernel-bigsmp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032914" comment="kernel-debug less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032917" comment="kernel-um less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032918" comment="um-host-install-initrd less than 1.0-48.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032919" comment="um-host-kernel less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
	<!-- e10ca3709a9019caf2c4ceda142f2980 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030615" comment="kernel-default less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030616" comment="kernel-smp less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030617" comment="kernel-source less than 2.6.5-7.201"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030618" comment="kernel-syms less than 2.6.5-7.201"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2558</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2558" source="CVE"/>
	<description>
	Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field.
	</description>
 </metadata>
<!-- c8fb4edbc90e89596212e0827b8bf34d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030667" comment="mysql-Max less than 4.0.18-32.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030668" comment="mysql-devel less than 4.0.18-32.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030669" comment="mysql less than 4.0.18-32.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2700</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2700" source="CVE"/>
	<description>
	ssl_engine_kernel.c in mod_ssl before 2.8.24, when using "SSLVerifyClient optional" in the global virtual host configuration, does not properly enforce "SSLVerifyClient require" in a per-location context, which allows remote attackers to bypass intended access restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 798e9e22eaf4a4eed570f26abfab9f02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032931" comment="apache2-prefork less than 2.0.49-27.59"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032932" comment="apache2-worker less than 2.0.49-27.59"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032933" comment="apache2 less than 2.0.49-27.59"/>
		</criteria>
	</criteria>
	<!-- f2a372ddb83d6f0e292e5c1e24bd50df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032927" comment="apache2-devel less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032928" comment="apache2-prefork less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032929" comment="apache2-worker less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032930" comment="apache2 less than 2.0.49-27.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030661" comment="libapr0 less than 2.0.49-27.34"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2701</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2701" source="CVE"/>
	<description>
	Heap-based buffer overflow in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to execute arbitrary code via an XBM image file that ends in a large number of spaces instead of the expected end tag.
	</description>
 </metadata>
<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032934" comment="mozilla-calendar less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2702</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2702" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via Unicode sequences with "zero-width non-joiner" characters.
	</description>
 </metadata>
<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032934" comment="mozilla-calendar less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2703</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2703" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to modify HTTP headers of XML HTTP requests via XMLHttpRequest, and possibly use the client to exploit vulnerabilities in servers or proxies, including HTTP request smuggling and HTTP request splitting.
	</description>
 </metadata>
<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032934" comment="mozilla-calendar less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2704</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2704" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spoof DOM objects via an XBL control that implements an internal XPCOM interface.
	</description>
 </metadata>
<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032934" comment="mozilla-calendar less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2705</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2705" source="CVE"/>
	<description>
	Integer overflow in the JavaScript engine in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 might allow remote attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032934" comment="mozilla-calendar less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2706</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2706" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla before Suite 1.7.12 allows remote attackers to execute Javascript with chrome privileges via an about: page such as about:mozilla.
	</description>
 </metadata>
<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032934" comment="mozilla-calendar less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2707</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2707" source="CVE"/>
	<description>
	Firefox before 1.0.7 and Mozilla Suite before 1.7.12 allows remote attackers to spawn windows without user interface components such as the address and status bar, which could be used to conduct spoofing or phishing attacks.
	</description>
 </metadata>
<!-- b310b00e5cb76adf21b02190e55fb6a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032934" comment="mozilla-calendar less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030672" comment="mozilla-cs less than 1.7.5-4.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030673" comment="mozilla-deat less than 1.7.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030674" comment="mozilla-devel less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030675" comment="mozilla-dom-inspector less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030676" comment="mozilla-hu less than 1.78-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030677" comment="mozilla-irc less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030678" comment="mozilla-ja less than 1.7.7-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030679" comment="mozilla-ko less than 1.75-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030681" comment="mozilla-mail less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030682" comment="mozilla-venkman less than 1.7.8-5.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030683" comment="mozilla less than 1.7.8-5.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2728</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728" source="CVE"/>
	<description>
	The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
	</description>
 </metadata>
<!-- f2a372ddb83d6f0e292e5c1e24bd50df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032927" comment="apache2-devel less than 2.0.49-27.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032928" comment="apache2-prefork less than 2.0.49-27.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032929" comment="apache2-worker less than 2.0.49-27.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032930" comment="apache2 less than 2.0.49-27.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030661" comment="libapr0 less than 2.0.49-27.34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2794</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2794" source="CVE"/>
	<description>
	store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING.
	</description>
 </metadata>
<!-- 85ba6a819d1bfca01a40c2df560d958d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032935" comment="squid less than 2.5.STABLE5-42.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2796</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2796" source="CVE"/>
	<description>
	The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (segmentation fault) via certain crafted requests.
	</description>
 </metadata>
<!-- 85ba6a819d1bfca01a40c2df560d958d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032935" comment="squid less than 2.5.STABLE5-42.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2797</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2797" source="CVE"/>
	<description>
	OpenSSH 4.0, and other versions before 4.2, does not properly handle dynamic port forwarding ("-D" option) when a listen address is not provided, which may cause OpenSSH to enable the GatewayPorts functionality.
	</description>
 </metadata>
<!-- e00a6e1fcc18cc47415e3e46f02a76fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030685" comment="openssh-askpass less than 4.1p1-11.38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030686" comment="openssh less than 4.1p1-11.38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2800</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800" source="CVE"/>
	<description>
	Memory leak in the seq_file implemenetation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2872</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872" source="CVE"/>
	<description>
	The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2876</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2876" source="CVE"/>
	<description>
	umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.
	</description>
 </metadata>
<!-- 9c77391557809fad062df3ab3a8dd436 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030689" comment="util-linux less than 2.12-72.39.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2917</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2917" source="CVE"/>
	<description>
	Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
	</description>
 </metadata>
<!-- c33ed47cc6b52ea945e37bababfadae3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032936" comment="squid less than 2.5.STABLE5-42.44"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2933</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2933" source="CVE"/>
	<description>
	Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
	</description>
 </metadata>
<!-- 5f6a4ce69e6c32c5d76c4c930a189cd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032937" comment="imap-devel less than 2002e-92.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032938" comment="imap-lib less than 2002e-92.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2945</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2945" source="CVE"/>
	<description>
	arc 5.21j and earlier create temporary files with world-readable permissions, which allows local users to read sensitive information from files created by (1) arc (arc.c) or (2) marc (marc.c).
	</description>
 </metadata>
<!-- 9d308f73411993e55c6ab24d20793491 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032939" comment="arc less than 5.21e-653.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2958</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the GNOME Data Access library for GNOME2 (libgda2) 1.2.1 and earlier allow attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- c0633ad9cc88de3d20aeabddd1567fb2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030691" comment="libgda-devel less than 1.0.3-54.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030692" comment="libgda less than 1.0.3-54.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2969</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2969" source="CVE"/>
	<description>
	The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING option, disables a verification step that is required for preventing protocol version rollback attacks, which allows remote attackers to force a client and server to use a weaker protocol than needed via a man-in-the-middle attack.
	</description>
 </metadata>
<!-- 5ac94511860f4bb76c8ce92f5791934b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032940" comment="openssl-32bit less than 9-200510141947"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032941" comment="openssl-32bit less than 9-200510171254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032942" comment="openssl-64bit less than 9-200510151954"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032943" comment="openssl-devel-32bit less than 9-200510141947"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032944" comment="openssl-devel-32bit less than 9-200510171254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032945" comment="openssl-devel-64bit less than 9-200510151954"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030694" comment="openssl-devel less than 0.9.7d-15.15.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032946" comment="openssl-x86 less than 9-200510151354"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030695" comment="openssl less than 0.9.7d-15.15.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2970</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2970" source="CVE"/>
	<description>
	Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote attackers to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections.
	</description>
 </metadata>
<!-- bb4a89b3c4d67be82d0fb2f61d32cbb7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032947" comment="apache2-worker less than 2.0.49-27.36.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2973</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2973" source="CVE"/>
	<description>
	The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2974</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2974" source="CVE"/>
	<description>
	libungif library before 4.1.0 allows attackers to cause a denial of service via a crafted GIF file that triggers a null dereference.
	</description>
 </metadata>
<!-- 3ba43539b4fabe2a647c09b0426fe95e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032948" comment="libungif-32bit less than 9-200511021858"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032949" comment="libungif-32bit less than 9-200511022315"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032950" comment="libungif-64bit less than 9-200511021922"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032951" comment="libungif-x86 less than 9-200511021845"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030696" comment="libungif less than 4.1.0b1-585.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2975</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975" source="CVE"/>
	<description>
	io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
	</description>
 </metadata>
<!-- 810b5d5b88360d9fa4de633a3441dfd4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030697" comment="gdk-pixbuf-devel less than 0.22.0-62.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032952" comment="gdk-pixbuf-x86 less than 9-200511021845"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030698" comment="gdk-pixbuf less than 0.22.0-62.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2976</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976" source="CVE"/>
	<description>
	Integer overflow in io-xpm.c in gdk-pixbuf 0.22.0 in GTK+ before 2.8.7 allows attackers to cause a denial of service (crash) or execute arbitrary code via an XPM file with large height, width, and colour values, a different vulnerability than CVE-2005-3186.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4f5fae06488ebd06d78f3ec5ecb019e6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032953" comment="gtk2-32bit less than 9-200511021858"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032954" comment="gtk2-32bit less than 9-200511022315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032955" comment="gtk2-64bit less than 9-200511021922"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032956" comment="gtk2-devel less than 2.2.4-125.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032957" comment="gtk2-x86 less than 9-200511021845"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032958" comment="gtk2 less than 2.2.4-125.10"/>
		</criteria>
	</criteria>
	<!-- 810b5d5b88360d9fa4de633a3441dfd4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030697" comment="gdk-pixbuf-devel less than 0.22.0-62.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032952" comment="gdk-pixbuf-x86 less than 9-200511021845"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030698" comment="gdk-pixbuf less than 0.22.0-62.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2978</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978" source="CVE"/>
	<description>
	pnmtopng in netpbm before 10.25, when using the -trans option, uses uninitialized size and index variables when converting Portable Anymap (PNM) images to Portable Network Graphics (PNG), which might allow attackers to execute arbitrary code by modifying the stack.
	</description>
 </metadata>
<!-- d074b20b26ec1a884ab4688604ae1c57 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030702" comment="netpbm less than 10.11.4-172.6.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2992</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2992" source="CVE"/>
	<description>
	arc 5.21j and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different type of vulnerability than CVE-2005-2945.
	</description>
 </metadata>
<!-- 9d308f73411993e55c6ab24d20793491 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032939" comment="arc less than 5.21e-653.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3011</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3011" source="CVE"/>
	<description>
	The sort_offline function for texindex in texinfo 4.8 and earlier allows local users to overwrite arbitrary files via a symlink attack on temporary files.
	</description>
 </metadata>
<!-- 1474e956ae188821ca845e9d2407cc6e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030703" comment="texinfo less than 4.6-61.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3013</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3013" source="CVE"/>
	<description>
	Buffer overflow in liby2util in Yet another Setup Tool (YaST) for SuSE Linux 9.3 allows local users to execute arbitrary code via a long Loc entry.
	</description>
 </metadata>
<!-- ca7aae82c004049bc264cbb952ae7bc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030704" comment="liby2util-devel less than 2.9.27-0.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030705" comment="liby2util less than 2.9.27-0.2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3044</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044" source="CVE"/>
	<description>
	Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3054</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3054" source="CVE"/>
	<description>
	fopen_wrappers.c in PHP 4.4.0, and possibly other versions, does not properly restrict access to other directories when the open_basedir directive includes a trailing slash, which allows PHP scripts in one directory to access files in other directories whose names are substrings of the original directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37e18301fb1ddfcd61d14ea84ce75441 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032962" comment="mod_php4-servlet less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
	<!-- ff2ec6a0837959e29a8a2ceeb1113997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3055</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055" source="CVE"/>
	<description>
	Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3110</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3110" source="CVE"/>
	<description>
	Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6, when running on an SMP system that is operating under a heavy load, might allow remote attackers to cause a denial of service (crash) via a series of packets that cause a value to be modified after it has been read but before it has been locked.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3180</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180" source="CVE"/>
	<description>
	The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3184</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3184" source="CVE"/>
	<description>
	Buffer overflow vulnerability in the unicode_to_bytes in the Service Location Protocol (srvloc) dissector (packet-srvloc.c) in Ethereal allows remote attackers to execute arbitrary code via a srvloc packet with a modified length value.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3185</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2029a7dd3980ab372ffc3f4542790a79 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032972" comment="curl-32bit less than 9-200511021858"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032973" comment="curl-32bit less than 9-200511022315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030706" comment="curl-devel less than 7.11.0-39.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030707" comment="curl less than 7.11.0-39.9"/>
		</criteria>
	</criteria>
	<!-- a4b05b41f1d218a2680342fec83ddb5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032974" comment="curl-32bit less than 9-200510171247"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030707" comment="curl less than 7.11.0-39.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3186</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186" source="CVE"/>
	<description>
	Integer overflow in the GTK+ gdk-pixbuf XPM image rendering library in GTK+ 2.4.0 allows attackers to execute arbitrary code via an XPM file with a number of colors that causes insufficient memory to be allocated, which leads to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4f5fae06488ebd06d78f3ec5ecb019e6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032953" comment="gtk2-32bit less than 9-200511021858"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032954" comment="gtk2-32bit less than 9-200511022315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032955" comment="gtk2-64bit less than 9-200511021922"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032956" comment="gtk2-devel less than 2.2.4-125.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032957" comment="gtk2-x86 less than 9-200511021845"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032958" comment="gtk2 less than 2.2.4-125.10"/>
		</criteria>
	</criteria>
	<!-- 810b5d5b88360d9fa4de633a3441dfd4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030697" comment="gdk-pixbuf-devel less than 0.22.0-62.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032952" comment="gdk-pixbuf-x86 less than 9-200511021845"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030698" comment="gdk-pixbuf less than 0.22.0-62.13"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3191</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the (1) DCTStream::readProgressiveSOF and (2) DCTStream::readBaselineSOF functions in the DCT stream parsing code (Stream.cc) in xpdf 3.01 and earlier, as used in products such as (a) Poppler, (b) teTeX, (c) KDE kpdf, (d) pdftohtml, (e) KOffice KWord, (f) CUPS, and (g) libextractor allow user-assisted attackers to cause a denial of service (heap corruption) and possibly execute arbitrary code via a crafted PDF file with an out-of-range number of components (numComps), which is used as an array index.
	</description>
 </metadata>
<!-- eab1246f6b01eeaf2b89d56dfd8852f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030708" comment="cups less than 1.1.20-108.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3192</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192" source="CVE"/>
	<description>
	Heap-based buffer overflow in the StreamPredictor function in Xpdf 3.01, as used in products such as (1) Poppler, (2) teTeX, (3) KDE kpdf, and (4) pdftohtml, (5) KOffice KWord, (6) CUPS, and (7) libextractor allows remote attackers to execute arbitrary code via a PDF file with an out-of-range numComps (number of components) field.
	</description>
 </metadata>
<!-- eab1246f6b01eeaf2b89d56dfd8852f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030708" comment="cups less than 1.1.20-108.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3239</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3239" source="CVE"/>
	<description>
	The OLE2 unpacker in clamd in Clam AntiVirus (ClamAV) 0.87-1 allows remote attackers to cause a denial of service (segmentation fault) via a DOC file with an invalid property tree, which triggers an infinite recursion in the ole2_walk_property_tree function.
	</description>
 </metadata>
<!-- c3210ed2fe51845857adeec8cf3ae08f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032975" comment="clamav less than 0.87.1-0.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3241</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3241" source="CVE"/>
	<description>
	Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors in the (1) ISAKMP, (2) FC-FCS, (3) RSVP, and (4) ISIS LSP dissector.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3242</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3242" source="CVE"/>
	<description>
	Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (crash) via unknown vectors in (1) the IrDA dissector and (2) the SMB dissector when SMB transaction payload reassembly is enabled.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3243</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3243" source="CVE"/>
	<description>
	Multiple buffer overflows in Ethereal 0.10.12 and earlier might allow remote attackers to execute arbitrary code via unknown vectors in the (1) SLIMP3 and (2) AgentX dissector.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3244</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3244" source="CVE"/>
	<description>
	The BER dissector in Ethereal 0.10.3 to 0.10.12 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3245</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3245" source="CVE"/>
	<description>
	Unspecified vulnerability in the ONC RPC dissector in Ethereal 0.10.3 to 0.10.12, when the "Dissect unknown RPC program numbers" option is enabled, allows remote attackers to cause a denial of service (memory consumption).
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3246</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3246" source="CVE"/>
	<description>
	Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (null dereference) via unknown vectors in the (1) SCSI, (2) sFlow, or (3) RTnet dissectors.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3247</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3247" source="CVE"/>
	<description>
	The SigComp UDVM in Ethereal 0.10.12 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3248</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3248" source="CVE"/>
	<description>
	Unspecified vulnerability in the X11 dissector in Ethereal 0.10.12 and earlier allows remote attackers to cause a denial of service (divide-by-zero) via unknown vectors.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3249</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3249" source="CVE"/>
	<description>
	Unspecified vulnerability in the WSP dissector in Ethereal 0.10.1 to 0.10.12 allows remote attackers to cause a denial of service or corrupt memory via unknown vectors that cause Ethereal to free an invalid pointer.
	</description>
 </metadata>
<!-- 32df407167a77ac06614c5407468ffbe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3252</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3252" source="CVE"/>
	<description>
	Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.
	</description>
 </metadata>
<!-- 48afb4b4c0875f6a077be241cd5a9efe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030709" comment="snort less than 2.3.2-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3256</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3256" source="CVE"/>
	<description>
	The key selection dialogue in Enigmail before 0.92.1 can incorrectly select a key with a user ID that does not have additional information, which allows parties with that key to decrypt the message.
	</description>
 </metadata>
<!-- 2310e8cc2ba4f42e93d9d71f96b31bac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030710" comment="mozilla-mail less than 1.7.8-5.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3258</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3258" source="CVE"/>
	<description>
	The rfc1738_do_escape function in ftp.c for Squid 2.5 STABLE11 and earlier allows remote FTP servers to cause a denial of service (segmentation fault) via certain "odd" responses.
	</description>
 </metadata>
<!-- c33ed47cc6b52ea945e37bababfadae3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032936" comment="squid less than 2.5.STABLE5-42.44"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3275</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275" source="CVE"/>
	<description>
	The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3303</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3303" source="CVE"/>
	<description>
	The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause "memory corruption" and execute arbitrary code via a crafted FSG 1.33 file.
	</description>
 </metadata>
<!-- c3210ed2fe51845857adeec8cf3ae08f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032975" comment="clamav less than 0.87.1-0.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3313</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3313" source="CVE"/>
	<description>
	The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers to cause a denial of service (infinite loop).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 32df407167a77ac06614c5407468ffbe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032971" comment="ethereal less than 0.10.13-2.4"/>
	</criteria>
	<!-- a2ac89797cd19cf7fb4f603cd18ecc53 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032976" comment="ethereal less than 0.10.13-2.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3319</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3319" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3319" source="CVE"/>
	<description>
	The apache2handler SAPI (sapi_apache2.c) in the Apache module (mod_php) for PHP 5.x before 5.1.0 final and 4.4 before 4.4.1 final allows attackers to cause a denial of service (segmentation fault) via the session.save_path option in a .htaccess file or VirtualHost.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37e18301fb1ddfcd61d14ea84ce75441 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032962" comment="mod_php4-servlet less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
	<!-- ff2ec6a0837959e29a8a2ceeb1113997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3350</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3350" source="CVE"/>
	<description>
	libungif library before 4.1.0 allows attackers to corrupt memory and possibly execute arbitrary code via a crafted GIF file that leads to an out-of-bounds write.
	</description>
 </metadata>
<!-- 3ba43539b4fabe2a647c09b0426fe95e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032948" comment="libungif-32bit less than 9-200511021858"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032949" comment="libungif-32bit less than 9-200511022315"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032950" comment="libungif-64bit less than 9-200511021922"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032951" comment="libungif-x86 less than 9-200511021845"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030696" comment="libungif less than 4.1.0b1-585.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3352</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4fc84db16e814bcc32aebeffa99bb7b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032977" comment="apache2-prefork less than 2.0.49-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032978" comment="apache2-worker less than 2.0.49-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032979" comment="apache2 less than 2.0.49-27.45"/>
		</criteria>
	</criteria>
	<!-- 7fac7ee58af7c7ce1abe19368372819d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032980" comment="apache-devel less than 1.3.29-71.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032981" comment="apache less than 1.3.29-71.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032982" comment="mod_ssl less than 2.8.16-71.24"/>
		</criteria>
	</criteria>
	<!-- 90eac595ae9e6c7fbeab2e05fb53a852 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032983" comment="apache2-prefork less than 2.0.49-27.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032984" comment="apache2-worker less than 2.0.49-27.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032985" comment="apache2 less than 2.0.49-27.51"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3353</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3353" source="CVE"/>
	<description>
	The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10622a3ab7ed7045185b273ec250fa88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032989" comment="mod_php4-servlet less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- 37e18301fb1ddfcd61d14ea84ce75441 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032962" comment="mod_php4-servlet less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
	<!-- 8c18bdf6bfa820f30d97b67dccd437c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- ff2ec6a0837959e29a8a2ceeb1113997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3356</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3356" source="CVE"/>
	<description>
	The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 186f161a242ba9368a91d962ee345c3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033000" comment="kernel-s390x less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033002" comment="kernel-um less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033003" comment="um-host-install-initrd less than 1.0-48.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033004" comment="um-host-kernel less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 804a98a9ce388ec8e0c1400aa2d7a687 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033005" comment="kernel-iseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033006" comment="kernel-pmac64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033007" comment="kernel-pseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 823abab8a4920fcbe7756a8433970068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033008" comment="kernel-s390 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 94a974abcf7178fb83b463abf6e13de7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033009" comment="kernel-64k-pagesize less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033010" comment="kernel-sn2 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3357</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357" source="CVE"/>
	<description>
	mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4fc84db16e814bcc32aebeffa99bb7b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032977" comment="apache2-prefork less than 2.0.49-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032978" comment="apache2-worker less than 2.0.49-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032979" comment="apache2 less than 2.0.49-27.45"/>
		</criteria>
	</criteria>
	<!-- 798e9e22eaf4a4eed570f26abfab9f02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032931" comment="apache2-prefork less than 2.0.49-27.59"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032932" comment="apache2-worker less than 2.0.49-27.59"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032933" comment="apache2 less than 2.0.49-27.59"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3358</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3358" source="CVE"/>
	<description>
	Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 186f161a242ba9368a91d962ee345c3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033000" comment="kernel-s390x less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033002" comment="kernel-um less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033003" comment="um-host-install-initrd less than 1.0-48.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033004" comment="um-host-kernel less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 804a98a9ce388ec8e0c1400aa2d7a687 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033005" comment="kernel-iseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033006" comment="kernel-pmac64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033007" comment="kernel-pseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 823abab8a4920fcbe7756a8433970068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033008" comment="kernel-s390 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 94a974abcf7178fb83b463abf6e13de7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033009" comment="kernel-64k-pagesize less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033010" comment="kernel-sn2 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3389</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389" source="CVE"/>
	<description>
	The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10622a3ab7ed7045185b273ec250fa88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032989" comment="mod_php4-servlet less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- 37e18301fb1ddfcd61d14ea84ce75441 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032962" comment="mod_php4-servlet less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
	<!-- 8c18bdf6bfa820f30d97b67dccd437c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- ff2ec6a0837959e29a8a2ceeb1113997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3390</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390" source="CVE"/>
	<description>
	The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10622a3ab7ed7045185b273ec250fa88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032989" comment="mod_php4-servlet less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- 37e18301fb1ddfcd61d14ea84ce75441 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032962" comment="mod_php4-servlet less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
	<!-- 8c18bdf6bfa820f30d97b67dccd437c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- ff2ec6a0837959e29a8a2ceeb1113997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032959" comment="apache-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032960" comment="apache2-mod_php4 less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032961" comment="mod_php4-core less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032963" comment="php4-devel less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032964" comment="php4-exif less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032965" comment="php4-fastcgi less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032966" comment="php4-imap less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032967" comment="php4-mysql less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032968" comment="php4-pear less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032969" comment="php4-session less than 4.3.4-43.46.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032970" comment="php4-sysvshm less than 4.3.4-43.46.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3391</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3391" source="CVE"/>
	<description>
	Multiple vulnerabilities in PHP before 4.4.1 allow remote attackers to bypass safe_mode and open_basedir restrictions via unknown attack vectors in (1) ext/curl and (2) ext/gd.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10622a3ab7ed7045185b273ec250fa88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032989" comment="mod_php4-servlet less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- 8c18bdf6bfa820f30d97b67dccd437c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3392</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3392" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10622a3ab7ed7045185b273ec250fa88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032989" comment="mod_php4-servlet less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- 8c18bdf6bfa820f30d97b67dccd437c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3500</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3500" source="CVE"/>
	<description>
	The tnef_attachment function in tnef.c for Clam AntiVirus (ClamAV) before 0.87.1 allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via a crafted value in a CAB file that causes ClamAV to repeatedly scan the same block.
	</description>
 </metadata>
<!-- c3210ed2fe51845857adeec8cf3ae08f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032975" comment="clamav less than 0.87.1-0.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3501</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3501" source="CVE"/>
	<description>
	The cabd_find function in cabd.c of the libmspack library (mspack) for Clam AntiVirus (ClamAV) before 0.87.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted CAB file that causes cabd_find to be called with a zero length.
	</description>
 </metadata>
<!-- c3210ed2fe51845857adeec8cf3ae08f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032975" comment="clamav less than 0.87.1-0.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3510</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
	</description>
 </metadata>
<!-- 2495ca9e3f4d48cf82846e7b51f4da79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033011" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033012" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033013" comment="jakarta-tomcat-doc less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033014" comment="jakarta-tomcat-examples less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030716" comment="jakarta-tomcat less than 5.0.19-29.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3570</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3570" source="CVE"/>
	<description>
	Unspecified cross-site scripting (XSS) vulnerability in Horde before 2.2.9 allows remote attackers to inject arbitrary web script or HTML via "not properly escaped error messages".
	</description>
 </metadata>
<!-- 366f350cd880ef05e5040c8780b81504 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033015" comment="horde less than 2.2.5-63.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3623</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3623" source="CVE"/>
	<description>
	nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 186f161a242ba9368a91d962ee345c3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033000" comment="kernel-s390x less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033002" comment="kernel-um less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033003" comment="um-host-install-initrd less than 1.0-48.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033004" comment="um-host-kernel less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 804a98a9ce388ec8e0c1400aa2d7a687 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033005" comment="kernel-iseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033006" comment="kernel-pmac64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033007" comment="kernel-pseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 823abab8a4920fcbe7756a8433970068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033008" comment="kernel-s390 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 94a974abcf7178fb83b463abf6e13de7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033009" comment="kernel-64k-pagesize less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033010" comment="kernel-sn2 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3632</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632" source="CVE"/>
	<description>
	Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 11d0803c9aa25e3642eea1e4de33d20d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030717" comment="libnetpbm less than 1.0.0-618.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030718" comment="netpbm less than 10.11.4-172.14"/>
		</criteria>
	</criteria>
	<!-- 5a2366732b3f33ea89b740686d13baf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030719" comment="netpbm less than 10.11.4-172.6.6"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3651</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651" source="CVE"/>
	<description>
	Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets.
	</description>
 </metadata>
<!-- 89bd75656702ed01153697c633d7a0ff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033016" comment="ethereal less than 0.10.13-2.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3662</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662" source="CVE"/>
	<description>
	Off-by-one buffer overflow in pnmtopng before 2.39, when using the -alpha command line option (Alphas_Of_Color), allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors.
	</description>
 </metadata>
<!-- 5a2366732b3f33ea89b740686d13baf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030719" comment="netpbm less than 10.11.4-172.6.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3671</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3671" source="CVE"/>
	<description>
	The Internet Key Exchange version 1 (IKEv1) implementation in Openswan 2 (openswan-2) before 2.4.4, and freeswan in SUSE LINUX 9.1 before 2.04_1.5.4-1.23, allow remote attackers to cause a denial of service via (1) a crafted packet using 3DES with an invalid key length, or (2) unspecified inputs when Aggressive Mode is enabled and the PSK is known, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
	</description>
 </metadata>
<!-- b009511f6a95df19e9a44b526dd24358 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030720" comment="freeswan less than 2.04_1.5.4-1.23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3732</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3732" source="CVE"/>
	<description>
	The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in racoon in ipsec-tools before 0.6.3, when running in aggressive mode, allows remote attackers to cause a denial of service (null dereference and crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1.
	</description>
 </metadata>
<!-- 9f8549c0fdb4c32ce15be24ba50f632b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030721" comment="ipsec-tools less than 0.3.3-1.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3783</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3783" source="CVE"/>
	<description>
	The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3784</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3784" source="CVE"/>
	<description>
	The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3806</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3806" source="CVE"/>
	<description>
	The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e2c7f08437e0128f5441c08f313e453 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- 268441775ca440ed04388897a55453d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032819" comment="kernel-iseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032820" comment="kernel-pmac64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032821" comment="kernel-pseries64 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- c7050141b3702832a32e74185b621254 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030556" comment="kernel-bigsmp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032822" comment="kernel-debug less than 2.6.5-7.202.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030553" comment="kernel-smp less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032823" comment="kernel-um less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032824" comment="um-host-install-initrd less than 1.0-48.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032825" comment="um-host-kernel less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- e400e6279f02255de204820f5290b8bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032826" comment="kernel-64k-pagesize less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032827" comment="kernel-debug less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030552" comment="kernel-default less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032828" comment="kernel-sn2 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- f43a8157eaa3cc5d6ad4e782c86273d5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032829" comment="kernel-s390x less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
	<!-- fa8599c9b2c6f42f6125cdff8246eb01 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032830" comment="kernel-s390 less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030554" comment="kernel-source less than 2.6.5-7.202.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030555" comment="kernel-syms less than 2.6.5-7.202.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3848" source="CVE"/>
	<description>
	Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 186f161a242ba9368a91d962ee345c3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033000" comment="kernel-s390x less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033002" comment="kernel-um less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033003" comment="um-host-install-initrd less than 1.0-48.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033004" comment="um-host-kernel less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 804a98a9ce388ec8e0c1400aa2d7a687 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033005" comment="kernel-iseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033006" comment="kernel-pmac64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033007" comment="kernel-pseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 823abab8a4920fcbe7756a8433970068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033008" comment="kernel-s390 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 94a974abcf7178fb83b463abf6e13de7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033009" comment="kernel-64k-pagesize less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033010" comment="kernel-sn2 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3858</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3858" source="CVE"/>
	<description>
	Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 186f161a242ba9368a91d962ee345c3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033000" comment="kernel-s390x less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 34f03dfffcde711fd59b2f89adf275de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030711" comment="kernel-bigsmp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033002" comment="kernel-um less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033003" comment="um-host-install-initrd less than 1.0-48.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033004" comment="um-host-kernel less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 804a98a9ce388ec8e0c1400aa2d7a687 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033005" comment="kernel-iseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033006" comment="kernel-pmac64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033007" comment="kernel-pseries64 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 823abab8a4920fcbe7756a8433970068 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033008" comment="kernel-s390 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 87c56bb926a498cfdb5b0219c188f773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030713" comment="kernel-smp less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
	<!-- 94a974abcf7178fb83b463abf6e13de7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033009" comment="kernel-64k-pagesize less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033001" comment="kernel-debug less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030712" comment="kernel-default less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033010" comment="kernel-sn2 less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030714" comment="kernel-source less than 2.6.5-7.252"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030715" comment="kernel-syms less than 2.6.5-7.252"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3883</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3883" source="CVE"/>
	<description>
	CRLF injection vulnerability in the mb_send_mail function in PHP before 5.1.0 might allow remote attackers to inject arbitrary e-mail headers via line feeds (LF) in the "To" address argument.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10622a3ab7ed7045185b273ec250fa88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032989" comment="mod_php4-servlet less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
	<!-- 8c18bdf6bfa820f30d97b67dccd437c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032986" comment="apache-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032987" comment="apache2-mod_php4 less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032988" comment="mod_php4-core less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032990" comment="php4-devel less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032991" comment="php4-exif less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032992" comment="php4-fastcgi less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032993" comment="php4-imap less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032994" comment="php4-mbstring less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032995" comment="php4-mysql less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032996" comment="php4-pear less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032997" comment="php4-recode less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032998" comment="php4-session less than 4.3.4-43.46.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032999" comment="php4-sysvshm less than 4.3.4-43.46.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3904</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3904" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Management Extensions (JMX) in Java JDK and JRE 5.0 Update 3, 1.4.2 and later, 1.3.1 and later allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors.
	</description>
 </metadata>
<!-- a4a96b4a8a21aa3aa9378b26ce492035 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030722" comment="java2-jre less than 1.4.2-129.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030723" comment="java2 less than 1.4.2-129.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3905</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3905" source="CVE"/>
	<description>
	Unspecified vulnerability in reflection APIs in Java SDK and JRE 1.3.1_15 and earlier, 1.4.2_08 and earlier, and JDK and JRE 5.0 Update 3 and earlier allows remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary application via unknown attack vectors, a different vulnerability than CVE-2005-3906.  NOTE: this is associated with the "first issue" identified in SUNALERT:102003.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 52a05ecc644334a436812cfe238e90d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033017" comment="IBMJava2-JRE less than 1.4.2-0.68"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033018" comment="IBMJava2-SDK less than 1.4.2-0.68"/>
		</criteria>
	</criteria>
	<!-- a4a96b4a8a21aa3aa9378b26ce492035 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030722" comment="java2-jre less than 1.4.2-129.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030723" comment="java2 less than 1.4.2-129.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3906</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3906" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in reflection APIs in Java SDK and JRE 1.4.2_08 and earlier and JDK and JRE 5.0 Update 3 and earlier allow remote attackers to escape the Java sandbox and access arbitrary files or execute arbitrary applications via unknown attack vectors, a different set of vulnerabilities than CVE-2005-3905.  NOTE: this is associated with the "second and third issues" identified in SUNALERT:102003.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 52a05ecc644334a436812cfe238e90d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033017" comment="IBMJava2-JRE less than 1.4.2-0.68"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033018" comment="IBMJava2-SDK less than 1.4.2-0.68"/>
		</criteria>
	</criteria>
	<!-- a4a96b4a8a21aa3aa9378b26ce492035 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030722" comment="java2-jre less than 1.4.2-129.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030723" comment="java2 less than 1.4.2-129.19"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3962</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3962" source="CVE"/>
	<description>
	Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
	</description>
 </metadata>
<!-- f1f7d27ae5fa1885e9f8997fbfd489de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030724" comment="perl-32bit less than 9-200512171950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033019" comment="perl-32bit less than 9-200512180809"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033020" comment="perl-64bit less than 9-200512180127"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033021" comment="perl-x86 less than 9-200512180003"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030725" comment="perl less than 5.8.3-32.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4190</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-4190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4190" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework before 3.0.8 allow remote authenticated users to inject arbitrary web script or HTML via multiple vectors, as demonstrated by (1) the identity field, (2) Category and (3) Label search fields, (4) the Mobile Phone field, and (5) Date and (6) Time fields when importing CSV files, as exploited through modules such as (a) Turba Address Book, (b) Kronolith, (c) Mnemo, and (d) Nag.
	</description>
 </metadata>
<!-- 520f1cdaf369265309f86e3469640298 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033022" comment="horde less than 2.2.5-63.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4268</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-4268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4268" source="CVE"/>
	<description>
	Buffer overflow in cpio 2.6-8.FC4 on 64-bit platforms, when creating a cpio archive, allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a file whose size is represented by more than 8 digits.
	</description>
 </metadata>
<!-- 538e74e078656d72bf43e00c836ab28a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030558" comment="cpio less than 2.5-324.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4348</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-4348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348" source="CVE"/>
	<description>
	fetchmail before 6.3.1 and before 6.2.5.5, when configured for multidrop mode, allows remote attackers to cause a denial of service (application crash) by sending messages without headers from upstream mail servers.
	</description>
 </metadata>
<!-- 460569ff05f9f1dd9cb03924fffb9bda -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030726" comment="fetchmail less than 6.2.5-49.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4585</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-4585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4585" source="CVE"/>
	<description>
	Unspecified vulnerability in the GTP dissector for Ethereal 0.9.1 to 0.10.13 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
	</description>
 </metadata>
<!-- 89bd75656702ed01153697c633d7a0ff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033016" comment="ethereal less than 0.10.13-2.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4772</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4772" source="CVE"/>
	<description>
	liby2util in Yet another Setup Tool (YaST) in SUSE Linux before 20051007 preserves permissions and ownerships when copying a remote repository, which might allow local users to read or modify sensitive files, possibly giving local users the ability to exploit CVE-2005-3013.
	</description>
 </metadata>
<!-- ca7aae82c004049bc264cbb952ae7bc4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030704" comment="liby2util-devel less than 2.9.27-0.2.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030705" comment="liby2util less than 2.9.27-0.2.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0019</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019" source="CVE"/>
	<description>
	Heap-based buffer overflow in the encodeURI and decodeURI functions in the kjs JavaScript interpreter engine in KDE 3.2.0 through 3.5.0 allows remote attackers to execute arbitrary code via a crafted, UTF-8 encoded URI.
	</description>
 </metadata>
<!-- c529411b083519d0efa17dd55af4ae8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030729" comment="kdelibs3-32bit less than 9-200601130434"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033023" comment="kdelibs3-32bit less than 9-200601140751"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033024" comment="kdelibs3-64bit less than 9-200601140916"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030730" comment="kdelibs3-devel less than 3.2.1-44.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033025" comment="kdelibs3-x86 less than 9-200601130505"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030731" comment="kdelibs3 less than 3.2.1-44.65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0049</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0049" source="CVE"/>
	<description>
	gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
	</description>
 </metadata>
<!-- a78b647fae6fd03f11da9c538433f9c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030733" comment="gpg less than 1.2.4-68.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0052</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0052" source="CVE"/>
	<description>
	The attachment scrubber (Scrubber.py) in Mailman 2.1.5 and earlier, when using Python's library email module 2.5, allows remote attackers to cause a denial of service (mailing list delivery failure) via a multipart MIME message with a single part that has two blank lines between the first boundary and the end boundary.
	</description>
 </metadata>
<!-- f8df83e2b0054d4d222673467c50c10b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030734" comment="mailman less than 2.1.4-83.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0058</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058" source="CVE"/>
	<description>
	Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
	</description>
 </metadata>
<!-- bf2c034812fe447a315793ab64ee5d6d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033026" comment="sendmail less than 8.12.11-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0095</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0095" source="CVE"/>
	<description>
	dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0150</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0150" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the auth_ldap_log_reason function in Apache auth_ldap 1.6.0 and earlier allows remote attackers to execute arbitrary code via various vectors, including the username.
	</description>
 </metadata>
<!-- 65a202030105490cda435189729608bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033038" comment="authldap less than 1.6.0-882.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0208</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0208" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in PHP 4.4.1 and 5.1.1, when display_errors and html_errors are on, allow remote attackers to inject arbitrary web script or HTML via inputs to PHP applications that are not filtered when they are included in the resulting error message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8efb4f3beb727c620f322c16f27cb516 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033039" comment="apache-mod_php4 less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033040" comment="apache2-mod_php4 less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033041" comment="mod_php4-core less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033042" comment="mod_php4-servlet less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033043" comment="php4-devel less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033044" comment="php4-exif less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033045" comment="php4-fastcgi less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033046" comment="php4-imap less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033047" comment="php4-mbstring less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033048" comment="php4-mysql less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033049" comment="php4-pear less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033050" comment="php4-recode less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033051" comment="php4-session less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033052" comment="php4-sysvshm less than 4.3.4-43.50"/>
		</criteria>
	</criteria>
	<!-- d1695b6b87aaeba49edeb90ee2c3e31f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033039" comment="apache-mod_php4 less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033040" comment="apache2-mod_php4 less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033041" comment="mod_php4-core less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033043" comment="php4-devel less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033044" comment="php4-exif less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033045" comment="php4-fastcgi less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033046" comment="php4-imap less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033047" comment="php4-mbstring less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033048" comment="php4-mysql less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033049" comment="php4-pear less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033050" comment="php4-recode less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033051" comment="php4-session less than 4.3.4-43.50"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033052" comment="php4-sysvshm less than 4.3.4-43.50"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0225</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0225" source="CVE"/>
	<description>
	scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice.
	</description>
 </metadata>
<!-- c0a0e2dc5435936145cde433208b0b1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030740" comment="openssh-askpass less than 4.1p1-11.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030741" comment="openssh less than 4.1p1-11.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0455</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0455" source="CVE"/>
	<description>
	gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded.  Note: this also occurs when running the equivalent command "gpg --verify".
	</description>
 </metadata>
<!-- 76efde0032721703f2b0b1d8a15c440c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030742" comment="gpg less than 1.2.4-68.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0554</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0554" source="CVE"/>
	<description>
	Linux kernel 2.6 before 2.6.15.5 allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0555</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0555" source="CVE"/>
	<description>
	The Linux Kernel before 2.6.15.5 allows local users to cause a denial of service (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (direct I/O).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0557</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0557" source="CVE"/>
	<description>
	sys_mbind in mempolicy.c in Linux kernel 2.6.16 and earlier does not sanity check the maxnod variable before making certain computations for the get_nodes function, which has unknown impact and attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0582</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0582" source="CVE"/>
	<description>
	Unspecified vulnerability in rshd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2, when storing forwarded credentials, allows attackers to overwrite arbitrary files and change file ownership via unknown vectors.
	</description>
 </metadata>
<!-- f1e0fa19e4bd47f5f481fa6abb284ed4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030744" comment="heimdal-devel-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033053" comment="heimdal-devel-32bit less than 9-200602210946"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033054" comment="heimdal-devel-64bit less than 9-200602210547"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030745" comment="heimdal-devel less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030746" comment="heimdal-lib-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033055" comment="heimdal-lib-32bit less than 9-200602210946"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033056" comment="heimdal-lib-64bit less than 9-200602210547"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033057" comment="heimdal-lib-x86 less than 9-200602210537"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030747" comment="heimdal-lib less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030748" comment="heimdal less than 0.6.1rc3-55.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0645</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0645" source="CVE"/>
	<description>
	Tiny ASN.1 Library (libtasn1) before 0.2.18, as used by (1) GnuTLS 1.2.x before 1.2.10 and 1.3.x before 1.3.4, and (2) GNU Shishi, allows attackers to crash the DER decoder and possibly execute arbitrary code via "out-of-bounds access" caused by invalid input, as demonstrated by the ProtoVer SSL test suite.
	</description>
 </metadata>
<!-- 9227af38b7ec7336ece2f1ed01619cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030751" comment="gnutls-devel less than 1.0.8-26.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030752" comment="gnutls less than 1.0.8-26.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0646</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0646" source="CVE"/>
	<description>
	ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file.
	</description>
 </metadata>
<!-- 43ed32936d1f47c23b6d758b748169d9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030754" comment="binutils-32bit less than 9-200601210802"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033058" comment="binutils-32bit less than 9-200601220116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033059" comment="binutils-64bit less than 9-200601210920"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033060" comment="binutils-x86 less than 9-200601210926"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030755" comment="binutils less than 2.15.90.0.1.1-32.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0677</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0677" source="CVE"/>
	<description>
	telnetd in Heimdal 0.6.x before 0.6.6 and 0.7.x before 0.7.2 allows remote unauthenticated attackers to cause a denial of service (server crash) via unknown vectors that trigger a null dereference.
	</description>
 </metadata>
<!-- f1e0fa19e4bd47f5f481fa6abb284ed4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030744" comment="heimdal-devel-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033053" comment="heimdal-devel-32bit less than 9-200602210946"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033054" comment="heimdal-devel-64bit less than 9-200602210547"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030745" comment="heimdal-devel less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030746" comment="heimdal-lib-32bit less than 9-200602210430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033055" comment="heimdal-lib-32bit less than 9-200602210946"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033056" comment="heimdal-lib-64bit less than 9-200602210547"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033057" comment="heimdal-lib-x86 less than 9-200602210537"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030747" comment="heimdal-lib less than 0.6.1rc3-55.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030748" comment="heimdal less than 0.6.1rc3-55.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0741</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0741" source="CVE"/>
	<description>
	Linux kernel before 2.6.15.5, when running on Intel processors, allows local users to cause a denial of service ("endless recursive fault") via unknown attack vectors related to a "bad elf entry address."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0744</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0744" source="CVE"/>
	<description>
	Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0747</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0747" source="CVE"/>
	<description>
	Integer underflow in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a font file with an odd number of blue values, which causes the underflow when decrementing by 2 in a context that assumes an even number of values.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033072" comment="freetype2-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033073" comment="freetype2-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033074" comment="freetype2-devel-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033075" comment="freetype2-devel-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033076" comment="freetype2-x86 less than 9-200606140312"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0749</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0749" source="CVE"/>
	<description>
	nsHTMLContentSink.cpp in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors involving a "particular sequence of HTML tags" that leads to memory corruption.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0803</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0803" source="CVE"/>
	<description>
	The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used.
	</description>
 </metadata>
<!-- 3b6c0c5ac07d0c820d800216e3ed2240 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030779" comment="liby2util-devel less than 2.9.27-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030780" comment="liby2util less than 2.9.27-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0855</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855" source="CVE"/>
	<description>
	Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
	</description>
 </metadata>
<!-- 2eddcef6bf69d75cf49f47f1b1445dfc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030781" comment="zoo less than 2.10-851.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0996</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8024627035edd1ff4446dc3a7d3f24d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
	<!-- bf2235a6cc07798093c542934e793c96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033091" comment="mod_php4-servlet less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1014</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1014" source="CVE"/>
	<description>
	Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail.  NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8024627035edd1ff4446dc3a7d3f24d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
	<!-- bf2235a6cc07798093c542934e793c96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033091" comment="mod_php4-servlet less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1015</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1015" source="CVE"/>
	<description>
	Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote attackers to read and create arbitrary files via the sendmail -C and -X arguments.  NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8024627035edd1ff4446dc3a7d3f24d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
	<!-- bf2235a6cc07798093c542934e793c96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033091" comment="mod_php4-servlet less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1054</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1054" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-1861.  Reason: This candidate is a reservation duplicate of CVE-2006-1861.  Notes: All CVE users should reference CVE-2006-1861 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033072" comment="freetype2-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033073" comment="freetype2-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033074" comment="freetype2-devel-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033075" comment="freetype2-devel-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033076" comment="freetype2-x86 less than 9-200606140312"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1056</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1056" source="CVE"/>
	<description>
	The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys.  NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processers in a security-relevant fashion that was not addressed by the kernels.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1168</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168" source="CVE"/>
	<description>
	The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow.
	</description>
 </metadata>
<!-- 60f15475e9f93d575b9b1f90bc15309c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033092" comment="ncompress less than 4.2.4-1.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1173</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173" source="CVE"/>
	<description>
	Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
	</description>
 </metadata>
<!-- e92dc8b293ef62544d01de2306f761b3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033093" comment="sendmail less than 8.12.11-2.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1242</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1242" source="CVE"/>
	<description>
	The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1260</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1260" source="CVE"/>
	<description>
	Horde Application Framework 3.0.9 allows remote attackers to read arbitrary files via a null character in the url parameter in services/go.php, which bypasses a sanity check.
	</description>
 </metadata>
<!-- 02915353b4b47ddcbe6470e3d7e394a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033094" comment="horde less than 2.2.5-63.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1269</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1269" source="CVE"/>
	<description>
	Buffer overflow in the parse function in parse.c in zoo 2.10 might allow local users to execute arbitrary code via long filename command line arguments, which are not properly handled during archive creation.  NOTE: since this issue is local and not setuid, the set of attack scenarios is limited, although is reasonable to expect that there are some situations in which the zoo user might automatically list attacker-controlled filenames to add to the zoo archive.
	</description>
 </metadata>
<!-- b3bb654cdbad2030607ffc36b26b0698 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030782" comment="zoo less than 2.10-851.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1342</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1342" source="CVE"/>
	<description>
	net/ipv4/af_inet.c in Linux kernel 2.4 does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the (1) getsockname, (2) getpeername, and (3) accept functions, which allows local users to obtain portions of potentially sensitive memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1354</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1354" source="CVE"/>
	<description>
	Unspecified vulnerability in FreeRADIUS 1.0.0 up to 1.1.0 allows remote attackers to bypass authentication or cause a denial of service (server crash) via "Insufficient input validation" in the EAP-MSCHAPv2 state machine module.
	</description>
 </metadata>
<!-- 3abbe09e8dae9ddc47532f7d512ed52b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033095" comment="freeradius less than 1.0.5-2.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1490</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490" source="CVE"/>
	<description>
	PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue.  NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8024627035edd1ff4446dc3a7d3f24d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
	<!-- bf2235a6cc07798093c542934e793c96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033091" comment="mod_php4-servlet less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1494</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1494" source="CVE"/>
	<description>
	Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8024627035edd1ff4446dc3a7d3f24d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
	<!-- bf2235a6cc07798093c542934e793c96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033078" comment="apache-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033079" comment="apache2-mod_php4 less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033080" comment="mod_php4-core less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033091" comment="mod_php4-servlet less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033081" comment="php4-devel less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033082" comment="php4-exif less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033083" comment="php4-fastcgi less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033084" comment="php4-imap less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033085" comment="php4-mbstring less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033086" comment="php4-mysql less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033087" comment="php4-pear less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033088" comment="php4-recode less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033089" comment="php4-session less than 4.3.4-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033090" comment="php4-sysvshm less than 4.3.4-43.53"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1516</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1516" source="CVE"/>
	<description>
	The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d94b3db707a1941a88a2f7c7933da754 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030783" comment="mysql less than 4.0.18-32.23"/>
	</criteria>
	<!-- dfa3b040161b26a12cd505da9c0b7bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030784" comment="mysql-Max less than 4.0.18-32.26"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1517</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1517" source="CVE"/>
	<description>
	sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d94b3db707a1941a88a2f7c7933da754 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030783" comment="mysql less than 4.0.18-32.23"/>
	</criteria>
	<!-- dfa3b040161b26a12cd505da9c0b7bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030784" comment="mysql-Max less than 4.0.18-32.26"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1518</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1518" source="CVE"/>
	<description>
	Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d94b3db707a1941a88a2f7c7933da754 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030783" comment="mysql less than 4.0.18-32.23"/>
	</criteria>
	<!-- dfa3b040161b26a12cd505da9c0b7bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030784" comment="mysql-Max less than 4.0.18-32.26"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1523</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1523" source="CVE"/>
	<description>
	The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1524</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1524" source="CVE"/>
	<description>
	madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability.  NOTE: this description was originally written in a way that combined two separate issues.  The mprotect issue now has a separate name, CVE-2006-2071.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1525</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1525" source="CVE"/>
	<description>
	ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1527</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1527" source="CVE"/>
	<description>
	The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1528</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1528" source="CVE"/>
	<description>
	Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1614</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1614" source="CVE"/>
	<description>
	Integer overflow in the cli_scanpe function in the PE header parser (libclamav/pe.c) in Clam AntiVirus (ClamAV) before 0.88.1, when ArchiveMaxFileSize is disabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code.
	</description>
 </metadata>
<!-- 16a5f07357d26c8b896b5811c6ac4d89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033096" comment="clamav less than 0.88.1-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1615</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1615" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the logging code in Clam AntiVirus (ClamAV) before 0.88.1 might allow remote attackers to execute arbitrary code.  NOTE: as of 20060410, it is unclear whether this is a vulnerability, as there is some evidence that the arguments are actually being sanitized properly.
	</description>
 </metadata>
<!-- 16a5f07357d26c8b896b5811c6ac4d89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033096" comment="clamav less than 0.88.1-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1630</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1630" source="CVE"/>
	<description>
	The cli_bitset_set function in libclamav/others.c in Clam AntiVirus (ClamAV) before 0.88.1 allows remote attackers to cause a denial of service via unspecified vectors that trigger an "invalid memory access."
	</description>
 </metadata>
<!-- 16a5f07357d26c8b896b5811c6ac4d89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033096" comment="clamav less than 0.88.1-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1721</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1721" source="CVE"/>
	<description>
	digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
	</description>
 </metadata>
<!-- 35452cb6896bec388d5e441a772fd24f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030786" comment="cyrus-sasl-digestmd5 less than 2.1.18-33.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1727</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1727" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to gain chrome privileges via multiple attack vectors related to the use of XBL scripts with "Print Preview".
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1728</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1728" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via unknown vectors related to the crypto.generateCRMFRequest method.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1729</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1729" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to read arbitrary files by (1) inserting the target filename into a text box, then turning that box into a file upload control, or (2) changing the type of the input control that is associated with an event handler.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1730</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1730" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0.1 allows remote attackers to execute arbitrary code via a large number in the CSS letter-spacing property that leads to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1731</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1731" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 returns the Object class prototype instead of the global window object when (1) .valueOf.call or (2) .valueOf.apply are called without any arguments, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1732</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1732" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to bypass same-origin protections and conduct cross-site scripting (XSS) attacks via unspecified vectors involving the window.controllers array.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1733</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1733" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly protect the compilation scope of privileged built-in XBL bindings, which allows remote attackers to execute arbitrary code via the (1) valueOf.call or (2) valueOf.apply methods of an XBL binding, or (3) "by inserting an XBL method into the DOM's document.body prototype chain."
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1734</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1734" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using the Object.watch method to access the "clone parent" internal function.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1735</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1735" source="CVE"/>
	<description>
	Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to execute arbitrary code by using an eval in an XBL method binding (XBL.method.eval) to create Javascript functions that are compiled with extra privileges.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1736</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1736" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to trick users into downloading and saving an executable file via an image that is overlaid by a transparent image link that points to the executable, which causes the executable to be saved when the user clicks the "Save image as..." option.  NOTE: this attack is made easier due to a GUI truncation issue that prevents the user from seeing the malicious extension when there is extra whitespace in the filename.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1737</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1737" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary bytecode via JavaScript with a large regular expression.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1738</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1738" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) by changing the (1) -moz-grid and (2) -moz-grid-group display styles.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1739</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1739" source="CVE"/>
	<description>
	The CSS border-rendering code in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain Cascading Style Sheets (CSS) that causes an out-of-bounds array write and buffer overflow.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1740</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1740" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing the location to a malicious site.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1741</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1741" source="CVE"/>
	<description>
	Mozilla Firefox 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 allows remote attackers to inject arbitrary Javascript into other sites by (1) "using a modal alert to suspend an event handler while a new page is being loaded", (2) using eval(), and using certain variants involving (3) "new Script;" and (4) using window.__proto__ to extend eval, aka "cross-site JavaScript injection".
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1742</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1742" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox and Thunderbird 1.x before 1.5 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.13, and SeaMonkey before 1.0 does not properly handle temporary variables that are not garbage collected, which might allow remote attackers to trigger operations on freed memory and cause memory corruption.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1790</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1790" source="CVE"/>
	<description>
	A regression fix in Mozilla Firefox 1.0.7 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the InstallTrigger.install method, which leads to memory corruption.
	</description>
 </metadata>
<!-- cf16d61c47496ed9e8c45206ca18f76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033077" comment="mozilla-calendar less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030767" comment="mozilla-cs less than 1.7.5-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030768" comment="mozilla-deat less than 1.7.6-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030769" comment="mozilla-devel less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030770" comment="mozilla-dom-inspector less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030771" comment="mozilla-hu less than 1.78-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030772" comment="mozilla-irc less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030773" comment="mozilla-ja less than 1.7.7-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030774" comment="mozilla-ko less than 1.75-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030776" comment="mozilla-mail less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030777" comment="mozilla-venkman less than 1.7.8-5.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030778" comment="mozilla less than 1.7.8-5.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1857</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1857" source="CVE"/>
	<description>
	Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1858</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1858" source="CVE"/>
	<description>
	SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1861</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType before 2.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via attack vectors related to (1) bdf/bdflib.c, (2) sfnt/ttcmap.c, (3) cff/cffgload.c, and (4) the read_lwfn function and a crafted LWFN file in base/ftmac.c.  NOTE: item 4 was originally identified by CVE-2006-2493.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a58c52af7fc0fe31cc51a8f418fd4ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030787" comment="XFree86-server less than 4.3.99.902-43.76"/>
	</criteria>
	<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033072" comment="freetype2-32bit less than 9-200606140645"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033073" comment="freetype2-64bit less than 9-200606140026"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033074" comment="freetype2-devel-32bit less than 9-200606140645"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033075" comment="freetype2-devel-64bit less than 9-200606140026"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033076" comment="freetype2-x86 less than 9-200606140312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1863</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1863" source="CVE"/>
	<description>
	Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1864</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1864" source="CVE"/>
	<description>
	Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1931</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931" source="CVE"/>
	<description>
	The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.
	</description>
 </metadata>
<!-- de9e1328949e358786eb6c04abf043ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030788" comment="ruby less than 1.8.1-42.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1932</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1932" source="CVE"/>
	<description>
	Off-by-one error in the OID printing routine in Ethereal 0.10.x up to 0.10.14 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1933</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1933" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (large or infinite loops) viarafted packets to the (1) UMA and (2) BER dissectors.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1934</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1934" source="CVE"/>
	<description>
	Multiple buffer overflows in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the (1) ALCAP dissector, (2) Network Instruments file code, or (3) NetXray/Windows Sniffer file code.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1935</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1935" source="CVE"/>
	<description>
	Buffer overflow in Ethereal 0.9.15 up to 0.10.14 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the COPS dissector.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1936</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1936" source="CVE"/>
	<description>
	Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1937</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1937" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) multiple vectors in H.248, and the (2) X.509if, (3) SRVLOC, (4) H.245, (5) AIM, and (6) general packet dissectors; and (7) the statistics counter.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1938</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1938" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Ethereal 0.8.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via the (1) Sniffer capture or (2) SMB PIPE dissector.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1939</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1939" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Ethereal 0.9.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) an invalid display filter, or the (2) GSM SMS, (3) ASN.1-based, (4) DCERPC NT, (5) PER, (6) RPC, (7) DCERPC, and (8) ASN.1 dissectors.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1940</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1940" source="CVE"/>
	<description>
	Unspecified vulnerability in Ethereal 0.10.4 up to 0.10.14 allows remote attackers to cause a denial of service (abort) via the SNDCP dissector.
	</description>
 </metadata>
<!-- 7343b83b2866e7abf45b8a99446ee1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033097" comment="ethereal less than 0.10.13-2.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1989</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1989" source="CVE"/>
	<description>
	Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.
	</description>
 </metadata>
<!-- a3286c0c00f12de2c70de79527adb2cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033098" comment="clamav less than 0.88.2-2.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1990</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1990" source="CVE"/>
	<description>
	Integer overflow in the wordwrap function in string.c in PHP 4.4.2 and 5.1.2 might allow context-dependent attackers to execute arbitrary code via certain long arguments that cause a small buffer to be allocated, which triggers a heap-based buffer overflow in a memcpy function call, a different vulnerability than CVE-2002-1396.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02d299d80da3813387b12f34a837aa51 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033099" comment="apache-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033100" comment="apache2-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033101" comment="mod_php4-core less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033102" comment="mod_php4-servlet less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033103" comment="php4-devel less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033104" comment="php4-exif less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033105" comment="php4-fastcgi less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033106" comment="php4-gd less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033107" comment="php4-imap less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033108" comment="php4-mbstring less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033109" comment="php4-mysql less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033110" comment="php4-pear less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033111" comment="php4-recode less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033112" comment="php4-session less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033113" comment="php4-sysvshm less than 4.3.4-43.58"/>
		</criteria>
	</criteria>
	<!-- 7fc9fde927d1b85e15a73d30fa51731f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033099" comment="apache-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033100" comment="apache2-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033101" comment="mod_php4-core less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033103" comment="php4-devel less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033104" comment="php4-exif less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033105" comment="php4-fastcgi less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033106" comment="php4-gd less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033107" comment="php4-imap less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033108" comment="php4-mbstring less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033109" comment="php4-mysql less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033110" comment="php4-pear less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033111" comment="php4-recode less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033112" comment="php4-session less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033113" comment="php4-sysvshm less than 4.3.4-43.58"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1991</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1991" source="CVE"/>
	<description>
	The substr_compare function in string.c in PHP 5.1.2 allows context-dependent attackers to cause a denial of service (memory access violation) via an out-of-bounds offset argument.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02d299d80da3813387b12f34a837aa51 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033099" comment="apache-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033100" comment="apache2-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033101" comment="mod_php4-core less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033102" comment="mod_php4-servlet less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033103" comment="php4-devel less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033104" comment="php4-exif less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033105" comment="php4-fastcgi less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033106" comment="php4-gd less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033107" comment="php4-imap less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033108" comment="php4-mbstring less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033109" comment="php4-mysql less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033110" comment="php4-pear less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033111" comment="php4-recode less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033112" comment="php4-session less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033113" comment="php4-sysvshm less than 4.3.4-43.58"/>
		</criteria>
	</criteria>
	<!-- 7fc9fde927d1b85e15a73d30fa51731f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033099" comment="apache-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033100" comment="apache2-mod_php4 less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033101" comment="mod_php4-core less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033103" comment="php4-devel less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033104" comment="php4-exif less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033105" comment="php4-fastcgi less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033106" comment="php4-gd less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033107" comment="php4-imap less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033108" comment="php4-mbstring less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033109" comment="php4-mysql less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033110" comment="php4-pear less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033111" comment="php4-recode less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033112" comment="php4-session less than 4.3.4-43.58"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033113" comment="php4-sysvshm less than 4.3.4-43.58"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2024</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2024" source="CVE"/>
	<description>
	Multiple vulnerabilities in libtiff before 3.8.1 allow context-dependent attackers to cause a denial of service via a TIFF image that triggers errors in (1) the TIFFFetchAnyArray function in (a) tif_dirread.c; (2) certain "codec cleanup methods" in (b) tif_lzw.c, (c) tif_pixarlog.c, and (d) tif_zip.c; (3) and improper restoration of setfield and getfield methods in cleanup functions within (e) tif_jpeg.c, tif_pixarlog.c, (f) tif_fax3.c, and tif_zip.c.
	</description>
 </metadata>
<!-- 32d301b13e21354ed937b6adbcb11461 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030789" comment="libtiff-32bit less than 9-200604240415"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033114" comment="libtiff-32bit less than 9-200604240730"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033115" comment="libtiff-64bit less than 9-200604240704"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033116" comment="libtiff-x86 less than 9-200604240512"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030790" comment="libtiff less than 3.6.1-38.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2025</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2025" source="CVE"/>
	<description>
	Integer overflow in the TIFFFetchData function in tif_dirread.c for libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a crafted TIFF image.
	</description>
 </metadata>
<!-- 32d301b13e21354ed937b6adbcb11461 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030789" comment="libtiff-32bit less than 9-200604240415"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033114" comment="libtiff-32bit less than 9-200604240730"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033115" comment="libtiff-64bit less than 9-200604240704"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033116" comment="libtiff-x86 less than 9-200604240512"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030790" comment="libtiff less than 3.6.1-38.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2026</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2026" source="CVE"/>
	<description>
	Double free vulnerability in tif_jpeg.c in libtiff before 3.8.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers errors related to "setfield/getfield methods in cleanup functions."
	</description>
 </metadata>
<!-- 32d301b13e21354ed937b6adbcb11461 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030789" comment="libtiff-32bit less than 9-200604240415"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033114" comment="libtiff-32bit less than 9-200604240730"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033115" comment="libtiff-64bit less than 9-200604240704"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033116" comment="libtiff-x86 less than 9-200604240512"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030790" comment="libtiff less than 3.6.1-38.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2162</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2162" source="CVE"/>
	<description>
	Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header.
	</description>
 </metadata>
<!-- 1c0c34024b73ee5d77a0b51a4b5f3306 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033117" comment="nagios-www less than 1.2-73.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2191</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2191" source="CVE"/>
	<description>
	** DISPUTED **  Format string vulnerability in Mailman before 2.1.9 allows attackers to execute arbitrary code via unspecified vectors. NOTE: the vendor has disputed this vulnerability, stating that it is "unexploitable."
	</description>
 </metadata>
<!-- 7d7b4291a8a6bf4a9378e00b2c4c8f7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030791" comment="mailman less than 2.1.4-83.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2195</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2195" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in horde 3 (horde3) before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via (1) templates/problem/problem.inc and (2) test.php.
	</description>
 </metadata>
<!-- 520f1cdaf369265309f86e3469640298 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033022" comment="horde less than 2.2.5-63.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2223</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2223" source="CVE"/>
	<description>
	RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) require plaintext or MD5 authentication, which allows remote attackers to obtain sensitive information (routing state) via REQUEST packets such as SEND UPDATE.
	</description>
 </metadata>
<!-- 773e5b1f3d0d61d71c42976f520ca131 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033118" comment="quagga less than 0.96.4-31.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2224</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2224" source="CVE"/>
	<description>
	RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows remote attackers to modify routing state via RIPv1 RESPONSE packets.
	</description>
 </metadata>
<!-- 773e5b1f3d0d61d71c42976f520ca131 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033118" comment="quagga less than 0.96.4-31.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2271</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2271" source="CVE"/>
	<description>
	The ECNE chunk handling in Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via an unexpected chunk when the session is in CLOSED state.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2272</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2272" source="CVE"/>
	<description>
	Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (kernel panic) via incoming IP fragmented (1) COOKIE_ECHO and (2) HEARTBEAT SCTP control chunks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2274</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2274" source="CVE"/>
	<description>
	Linux SCTP (lksctp) before 2.6.17 allows remote attackers to cause a denial of service (infinite recursion and crash) via a packet that contains two or more DATA fragments, which causes an skb pointer to refer back to itself when the full message is reassembled, leading to infinite recursion in the sctp_skb_pull function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a44452b6ec2076b441850a41a2711c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033027" comment="kernel-64k-pagesize less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033029" comment="kernel-sn2 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- 55ecd36eedc87087ae2e28c961faef64 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033030" comment="kernel-iseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033031" comment="kernel-pmac64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033032" comment="kernel-pseries64 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- a85a3e0133108b1cb77026293bc419dc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- c7910bbd0cc63477f583e6a6b35500ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033033" comment="kernel-s390 less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- d315ac40f92dc38783162cde676a7b10 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033034" comment="kernel-s390x less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
	<!-- e793251698757eb4bf71b0822baf6a5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030739" comment="kernel-bigsmp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033028" comment="kernel-debug less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030735" comment="kernel-default less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030736" comment="kernel-smp less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030737" comment="kernel-source less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030738" comment="kernel-syms less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033035" comment="kernel-um less than 2.6.5-7.257"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033036" comment="um-host-install-initrd less than 1.0-48.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033037" comment="um-host-kernel less than 2.6.5-7.257"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2313</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2313" source="CVE"/>
	<description>
	PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications via invalid encodings of multibyte characters, aka one variant of "Encoding-Based SQL Injection."
	</description>
 </metadata>
<!-- da59db7f50aac32f6bd1b258f6e09652 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030821" comment="postgresql-contrib less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030822" comment="postgresql-devel less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030823" comment="postgresql-docs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030824" comment="postgresql-libs-32bit less than 9-200605291910"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033119" comment="postgresql-libs-32bit less than 9-200605292202"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033120" comment="postgresql-libs-64bit less than 9-200605291954"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033121" comment="postgresql-libs-x86 less than 9-200605291842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030825" comment="postgresql-libs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030826" comment="postgresql-pl less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030827" comment="postgresql-server less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030828" comment="postgresql less than 7.4.13-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2314</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2314" source="CVE"/>
	<description>
	PostgreSQL 8.1.x before 8.1.4, 8.0.x before 8.0.8, 7.4.x before 7.4.13, 7.3.x before 7.3.15, and earlier versions allows context-dependent attackers to bypass SQL injection protection methods in applications that use multibyte encodings that allow the "\" (backslash) byte 0x5c to be the trailing byte of a multibyte character, such as SJIS, BIG5, GBK, GB18030, and UHC, which cannot be handled correctly by a client that does not understand multibyte encodings, aka a second variant of "Encoding-Based SQL Injection." NOTE: it could be argued that this is a class of issue related to interaction errors between the client and PostgreSQL, but a CVE has been assigned since PostgreSQL is treating this as a preventative measure against this class of problem.
	</description>
 </metadata>
<!-- da59db7f50aac32f6bd1b258f6e09652 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030821" comment="postgresql-contrib less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030822" comment="postgresql-devel less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030823" comment="postgresql-docs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030824" comment="postgresql-libs-32bit less than 9-200605291910"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033119" comment="postgresql-libs-32bit less than 9-200605292202"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033120" comment="postgresql-libs-64bit less than 9-200605291954"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033121" comment="postgresql-libs-x86 less than 9-200605291842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030825" comment="postgresql-libs less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030826" comment="postgresql-pl less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030827" comment="postgresql-server less than 7.4.13-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030828" comment="postgresql less than 7.4.13-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2362</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2362" source="CVE"/>
	<description>
	Buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format (TekHex) record in which the length character is not a valid hexadecimal character.
	</description>
 </metadata>
<!-- 5887ede68e068a4a4275a811661b5b87 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030829" comment="binutils-32bit less than 9-200610302219"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033122" comment="binutils-32bit less than 9-200610310204"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033123" comment="binutils-64bit less than 9-200610302306"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033124" comment="binutils-x86 less than 9-200610302220"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030830" comment="binutils less than 2.15.90.0.1.1-32.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2444</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2444" source="CVE"/>
	<description>
	The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2447</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2447" source="CVE"/>
	<description>
	SpamAssassin before 3.1.3, when running with vpopmail and the paranoid (-P) switch, allows remote attackers to execute arbitrary commands via a crafted message that is not properly handled when invoking spamd with the virtual pop username.
	</description>
 </metadata>
<!-- 8b27f3035ab308f3b3f9e3c9b4b4b044 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030831" comment="perl-spamassassin less than 2.64-3.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2448</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2448" source="CVE"/>
	<description>
	Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2449</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2449" source="CVE"/>
	<description>
	KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack related to the session type for login.
	</description>
 </metadata>
<!-- 292ea0b25bd919ecf3df3ef887f35425 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033125" comment="kdebase3-kdm less than 3.2.1-68.53"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2451</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2451" source="CVE"/>
	<description>
	The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2452</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2452" source="CVE"/>
	<description>
	GNOME GDM 2.8, 2.12, 2.14, and 2.15, when the "face browser" feature is enabled, allows local users to access the "Configure Login Manager" functionality using their own password instead of the root password, which can be leveraged to gain additional privileges.
	</description>
 </metadata>
<!-- 86ea741376acfa1ddfc8ef9e5e57a13b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033126" comment="gdm less than 2.4.4.7-35.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2493</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2493" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-1861.  Reason: This candidate is a duplicate of CVE-2006-1861.  Notes: All CVE users should reference CVE-2006-1861 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033072" comment="freetype2-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033073" comment="freetype2-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033074" comment="freetype2-devel-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033075" comment="freetype2-devel-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033076" comment="freetype2-x86 less than 9-200606140312"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2563</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2563" source="CVE"/>
	<description>
	The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to bypass safe mode and read files via a file:// request containing null characters.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a2f0555d36498842c2e883d8fb6e27e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033127" comment="apache-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033128" comment="apache2-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033129" comment="mod_php4-core less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033130" comment="mod_php4-servlet less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033131" comment="php4-curl less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033132" comment="php4-devel less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033133" comment="php4-exif less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033134" comment="php4-fastcgi less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033135" comment="php4-gd less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033136" comment="php4-imap less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033137" comment="php4-mbstring less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033138" comment="php4-mysql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033139" comment="php4-pear less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033140" comment="php4-pgsql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033141" comment="php4-recode less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033142" comment="php4-session less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033143" comment="php4-sysvshm less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033144" comment="php4-wddx less than 4.3.4-43.66"/>
		</criteria>
	</criteria>
	<!-- 47a19c67fad7fcec4d91c5a44208bcc5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033127" comment="apache-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033128" comment="apache2-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033129" comment="mod_php4-core less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033131" comment="php4-curl less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033132" comment="php4-devel less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033133" comment="php4-exif less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033134" comment="php4-fastcgi less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033135" comment="php4-gd less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033136" comment="php4-imap less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033137" comment="php4-mbstring less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033138" comment="php4-mysql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033139" comment="php4-pear less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033140" comment="php4-pgsql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033141" comment="php4-recode less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033142" comment="php4-session less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033143" comment="php4-sysvshm less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033144" comment="php4-wddx less than 4.3.4-43.66"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2607</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607" source="CVE"/>
	<description>
	do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
	</description>
 </metadata>
<!-- 9b78595924034dfdf1a0dcd1777838f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030835" comment="cron less than 3.0.1-920.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2656</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2656" source="CVE"/>
	<description>
	Stack-based buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier might might allow attackers to execute arbitrary code via a long filename.  NOTE: tiffsplit is not setuid.  If there is not a common scenario under which tiffsplit is called with attacker-controlled command line arguments, then perhaps this issue should not be included in CVE.
	</description>
 </metadata>
<!-- 21b97ac78198808ff6b59cf8e3bdf0b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030836" comment="tiff less than 3.6.1-38.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2657</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2657" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-3017.  Reason: This candidate is a reservation duplicate of CVE-2006-3017.  Notes: All CVE users should reference CVE-2006-3017 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 154731d4e512c74bcb44fc5c8c40119b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033145" comment="apache-mod_php4 less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033146" comment="apache2-mod_php4 less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033147" comment="mod_php4-core less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033148" comment="mod_php4-servlet less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033149" comment="php4-devel less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033150" comment="php4-exif less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033151" comment="php4-fastcgi less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033152" comment="php4-gd less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033153" comment="php4-imap less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033154" comment="php4-mbstring less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033155" comment="php4-mysql less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033156" comment="php4-pear less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033157" comment="php4-recode less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033158" comment="php4-session less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033159" comment="php4-sysvshm less than 4.3.4-43.61"/>
		</criteria>
	</criteria>
	<!-- 872c84fe4ddb36cc6c947d71d9705360 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033145" comment="apache-mod_php4 less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033146" comment="apache2-mod_php4 less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033147" comment="mod_php4-core less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033149" comment="php4-devel less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033150" comment="php4-exif less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033151" comment="php4-fastcgi less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033152" comment="php4-gd less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033153" comment="php4-imap less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033154" comment="php4-mbstring less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033155" comment="php4-mysql less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033156" comment="php4-pear less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033157" comment="php4-recode less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033158" comment="php4-session less than 4.3.4-43.61"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033159" comment="php4-sysvshm less than 4.3.4-43.61"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2661</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2661" source="CVE"/>
	<description>
	ftutil.c in Freetype before 2.2 allows remote attackers to cause a denial of service (crash) via a crafted font file that triggers a null dereference.
	</description>
 </metadata>
<!-- 6dbf1efb42be3b7b43ec184b71d00153 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030761" comment="freetype2-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033072" comment="freetype2-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033073" comment="freetype2-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030762" comment="freetype2-devel-32bit less than 9-200606132344"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033074" comment="freetype2-devel-32bit less than 9-200606140645"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033075" comment="freetype2-devel-64bit less than 9-200606140026"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030763" comment="freetype2-devel less than 2.1.7-53.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033076" comment="freetype2-x86 less than 9-200606140312"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030764" comment="freetype2 less than 2.1.7-53.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2769</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2769" source="CVE"/>
	<description>
	The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration.
	</description>
 </metadata>
<!-- 88cedfd543976a123b966bb0b977632e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030837" comment="snort less than 2.3.2-0.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2894</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2894" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.0.4, 2.0.x before 2.0.0.8, Mozilla Suite 1.7.13, Mozilla SeaMonkey 1.0.2 and other versions before 1.1.5, and Netscape 8.1 and earlier allow user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2916</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916" source="CVE"/>
	<description>
	artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
	</description>
 </metadata>
<!-- 79defadba854b4eed84abae8b9808eea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033161" comment="arts-32bit less than 9-200606211802"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030852" comment="arts-32bit less than 9-200606211826"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033162" comment="arts-64bit less than 9-200606211820"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033163" comment="arts-x86 less than 9-200606211846"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030853" comment="arts less than 1.2.1-35.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2934</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934" source="CVE"/>
	<description>
	SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2935</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935" source="CVE"/>
	<description>
	The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2936</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936" source="CVE"/>
	<description>
	The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2937</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937" source="CVE"/>
	<description>
	OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.
	</description>
 </metadata>
<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033175" comment="openssl-32bit less than 9-200609270843"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033176" comment="openssl-64bit less than 9-200609270842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033177" comment="openssl-devel-32bit less than 9-200609270843"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033178" comment="openssl-devel-64bit less than 9-200609270842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033179" comment="openssl-x86 less than 9-200609271104"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2940</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940" source="CVE"/>
	<description>
	OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03b8557c3814c26b0caf9fbe2677b9ae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030863" comment="openssl-32bit less than 9-200610132325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033180" comment="openssl-32bit less than 9-200610141314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033181" comment="openssl-64bit less than 9-200610151241"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030864" comment="openssl-devel-32bit less than 9-200610132325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033182" comment="openssl-devel-32bit less than 9-200610141314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033183" comment="openssl-devel-64bit less than 9-200610151241"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030865" comment="openssl-devel less than 0.9.7d-15.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033184" comment="openssl-x86 less than 9-200610140253"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030866" comment="openssl less than 0.9.7d-15.32"/>
		</criteria>
	</criteria>
	<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033175" comment="openssl-32bit less than 9-200609270843"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033176" comment="openssl-64bit less than 9-200609270842"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033177" comment="openssl-devel-32bit less than 9-200609270843"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033178" comment="openssl-devel-64bit less than 9-200609270842"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033179" comment="openssl-x86 less than 9-200609271104"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2941</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2941" source="CVE"/>
	<description>
	Mailman before 2.1.9rc1 allows remote attackers to cause a denial of service via unspecified vectors involving "standards-breaking RFC 2231 formatted headers".
	</description>
 </metadata>
<!-- 7d7b4291a8a6bf4a9378e00b2c4c8f7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030791" comment="mailman less than 2.1.4-83.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3082</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3082" source="CVE"/>
	<description>
	parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
	</description>
 </metadata>
<!-- 0c1209e2e201376b26446619ccffb23e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030867" comment="gpg less than 1.2.4-68.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3085</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3085" source="CVE"/>
	<description>
	xt_sctp in netfilter for Linux kernel before 2.6.17.1 allows attackers to cause a denial of service (infinite loop) via an SCTP chunk with a 0 length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3121</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3121" source="CVE"/>
	<description>
	The peel_netstring function in cl_netstring.c in the heartbeat subsystem in High-Availability Linux before 1.2.5, and 2.0 before 2.0.7, allows remote attackers to cause a denial of service (crash) via the length parameter in a heartbeat message.
	</description>
 </metadata>
<!-- a1db20e5a30352f1f8c0c51211d4ddd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032907" comment="heartbeat-ldirectord less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032908" comment="heartbeat-pils less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032909" comment="heartbeat-stonith less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032910" comment="heartbeat less than 1.2.5-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3242</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3242" source="CVE"/>
	<description>
	Stack-based buffer overflow in the browse_get_namespace function in imap/browse.c of Mutt 1.4.2.1 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via long namespaces received from the IMAP server.
	</description>
 </metadata>
<!-- 5a0f3b7c68d6058aaac617f40e61e770 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030873" comment="mutt less than 1.5.6i-64.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3334</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334" source="CVE"/>
	<description>
	Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
	</description>
 </metadata>
<!-- e998029189ef39123c667f390933f7c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033185" comment="libpng-32bit less than 9-200612010114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030875" comment="libpng-32bit less than 9-200612010115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033186" comment="libpng-64bit less than 9-200612010055"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030876" comment="libpng-devel less than 1.2.5-182.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033187" comment="libpng-x86 less than 9-200612010114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030877" comment="libpng less than 1.2.5-182.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3403</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403" source="CVE"/>
	<description>
	The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
	</description>
 </metadata>
<!-- c6fc729a4d59d3990295d101f02dd6df -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030879" comment="samba less than 3.0.20b-3.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3459</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the TIFF library (libtiff) before 3.8.2, as used in Adobe Reader 9.3.0 and other products, allow context-dependent attackers to execute arbitrary code or cause a denial of service via unspecified vectors, including a large tdir_count value in the TIFFFetchShortPair function in tif_dirread.c.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033188" comment="libtiff-32bit less than 9-200607272039"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033189" comment="libtiff-64bit less than 9-200607270723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033190" comment="libtiff-x86 less than 9-200607271336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3460</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3460" source="CVE"/>
	<description>
	Heap-based buffer overflow in the JPEG decoder in the TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via an encoded JPEG stream that is longer than the scan line size (TiffScanLineSize).
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033188" comment="libtiff-32bit less than 9-200607272039"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033189" comment="libtiff-64bit less than 9-200607270723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033190" comment="libtiff-x86 less than 9-200607271336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3461</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461" source="CVE"/>
	<description>
	Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033188" comment="libtiff-32bit less than 9-200607272039"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033189" comment="libtiff-64bit less than 9-200607270723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033190" comment="libtiff-x86 less than 9-200607271336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3462</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462" source="CVE"/>
	<description>
	Heap-based buffer overflow in the NeXT RLE decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors involving decoding large RLE images.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033188" comment="libtiff-32bit less than 9-200607272039"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033189" comment="libtiff-64bit less than 9-200607270723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033190" comment="libtiff-x86 less than 9-200607271336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3463</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3463" source="CVE"/>
	<description>
	The EstimateStripByteCounts function in TIFF library (libtiff) before 3.8.2 uses a 16-bit unsigned short when iterating over an unsigned 32-bit value, which allows context-dependent attackers to cause a denial of service via a large td_nstrips value, which triggers an infinite loop.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033188" comment="libtiff-32bit less than 9-200607272039"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033189" comment="libtiff-64bit less than 9-200607270723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033190" comment="libtiff-x86 less than 9-200607271336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3464</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3464" source="CVE"/>
	<description>
	TIFF library (libtiff) before 3.8.2 allows context-dependent attackers to pass numeric range checks and possibly execute code, and trigger assert errors, via large offset values in a TIFF directory that lead to an integer overflow and other unspecified vectors involving "unchecked arithmetic operations".
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033188" comment="libtiff-32bit less than 9-200607272039"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033189" comment="libtiff-64bit less than 9-200607270723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033190" comment="libtiff-x86 less than 9-200607271336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3465</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465" source="CVE"/>
	<description>
	Unspecified vulnerability in the custom tag support for the TIFF library (libtiff) before 3.8.2 allows remote attackers to cause a denial of service (instability or crash) and execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- af67a688fbb2e507784c8a1e9db46ab3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030881" comment="libtiff-32bit less than 9-200607271200"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033188" comment="libtiff-32bit less than 9-200607272039"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033189" comment="libtiff-64bit less than 9-200607270723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033190" comment="libtiff-x86 less than 9-200607271336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030882" comment="libtiff less than 3.6.1-38.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3467</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3467" source="CVE"/>
	<description>
	Integer overflow in FreeType before 2.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PCF file, as demonstrated by the Red Hat bad1.pcf test file, due to a partial fix of CVE-2006-1861.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a58c52af7fc0fe31cc51a8f418fd4ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030787" comment="XFree86-server less than 4.3.99.902-43.76"/>
	</criteria>
	<!-- f534b9ffd4b983d69bc74733530440a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030883" comment="freetype2-32bit less than 9-200607282027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033191" comment="freetype2-32bit less than 9-200607300148"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033192" comment="freetype2-64bit less than 9-200607282053"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030884" comment="freetype2-devel-32bit less than 9-200607282027"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033193" comment="freetype2-devel-32bit less than 9-200607300148"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033194" comment="freetype2-devel-64bit less than 9-200607282053"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030885" comment="freetype2-devel less than 2.1.7-53.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033195" comment="freetype2-x86 less than 9-200607282200"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030886" comment="freetype2 less than 2.1.7-53.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3468</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3468" source="CVE"/>
	<description>
	Linux kernel 2.6.x, when using both NFS and EXT3, allows remote attackers to cause a denial of service (file system panic) via a crafted UDP packet with a V2 lookup procedure that specifies a bad file handle (inode number), which triggers an error and causes an exported directory to be remounted read-only.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14f276ed108cb62104b1743ee48bd92b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033196" comment="kernel-s390x less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- 261185f7ea10c374f4fc53453e6ef3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- 5ba747ab54f313a5bd8726ca99439c15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033197" comment="kernel-iseries64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033198" comment="kernel-pmac64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033199" comment="kernel-pseries64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- b8565f7473b0f60258a2da4e825025da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033200" comment="kernel-64k-pagesize less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033201" comment="kernel-debug less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033202" comment="kernel-sn2 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- d501672f20f1f468d24344550dbc92e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033203" comment="kernel-s390 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- e2ef926c5f7d109a84807c89d6446736 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030891" comment="kernel-bigsmp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033201" comment="kernel-debug less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033204" comment="kernel-um less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033205" comment="um-host-install-initrd less than 1.0-48.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033206" comment="um-host-kernel less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3548</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3548" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 allow remote attackers to inject arbitrary web script or HTML via a (1) javascript URI or an external (2) http, (3) https, or (4) ftp URI in the url parameter in services/go.php (aka the dereferrer), (5) a javascript URI in the module parameter in services/help (aka the help viewer), and (6) the name parameter in services/problem.php (aka the problem reporting screen).
	</description>
 </metadata>
<!-- f2da6ff214ea63d1bdc91ab0ad182930 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033207" comment="horde less than 2.2.5-63.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3549</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3549" source="CVE"/>
	<description>
	services/go.php in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 does not properly restrict its image proxy capability, which allows remote attackers to perform "Web tunneling" attacks and use the server as a proxy via (1) http, (2) https, and (3) ftp URL in the url parameter, which is requested from the server.
	</description>
 </metadata>
<!-- f2da6ff214ea63d1bdc91ab0ad182930 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033207" comment="horde less than 2.2.5-63.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3626</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3626" source="CVE"/>
	<description>
	Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5a9c5d685ab1b7e99d030c3c0931b0ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033061" comment="kernel-s390 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- 97ee46bb758608c23a7a8f3794e95f5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033062" comment="kernel-s390x less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- a09c4d297070acc234594c664ed2e674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- b9980133c6300cf04c7bfe9fe654442d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030760" comment="kernel-bigsmp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033064" comment="kernel-um less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033065" comment="um-host-install-initrd less than 1.0-48.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033066" comment="um-host-kernel less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d5e125cb83e5f66e18a98737eda9e14c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033067" comment="kernel-iseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033068" comment="kernel-pmac64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033069" comment="kernel-pseries64 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030757" comment="kernel-smp less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
	<!-- d86992c99cab3db27f3af968ef051239 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033070" comment="kernel-64k-pagesize less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033063" comment="kernel-debug less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030756" comment="kernel-default less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033071" comment="kernel-sn2 less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030758" comment="kernel-source less than 2.6.5-7.276"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030759" comment="kernel-syms less than 2.6.5-7.276"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3627</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627" source="CVE"/>
	<description>
	Unspecified vulnerability in the GSM BSSMAP dissector in Wireshark (aka Ethereal) 0.10.11 to 0.99.0 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
	</description>
 </metadata>
<!-- e0325ea41f1bfa15494ac4511ae25749 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033208" comment="ethereal less than 0.10.13-2.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3628</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
	</description>
 </metadata>
<!-- e0325ea41f1bfa15494ac4511ae25749 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033208" comment="ethereal less than 0.10.13-2.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3629</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629" source="CVE"/>
	<description>
	Unspecified vulnerability in the MOUNT dissector in Wireshark (aka Ethereal) 0.9.4 to 0.99.0 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.
	</description>
 </metadata>
<!-- e0325ea41f1bfa15494ac4511ae25749 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033208" comment="ethereal less than 0.10.13-2.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3630</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630" source="CVE"/>
	<description>
	Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors.
	</description>
 </metadata>
<!-- e0325ea41f1bfa15494ac4511ae25749 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033208" comment="ethereal less than 0.10.13-2.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3631</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631" source="CVE"/>
	<description>
	Unspecified vulnerability in the SSH dissector in Wireshark (aka Ethereal) 0.9.10 to 0.99.0 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors.
	</description>
 </metadata>
<!-- e0325ea41f1bfa15494ac4511ae25749 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033208" comment="ethereal less than 0.10.13-2.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3632</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632" source="CVE"/>
	<description>
	Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector.
	</description>
 </metadata>
<!-- e0325ea41f1bfa15494ac4511ae25749 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033208" comment="ethereal less than 0.10.13-2.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3636</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3636" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.9rc1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
<!-- 7d7b4291a8a6bf4a9378e00b2c4c8f7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030791" comment="mailman less than 2.1.4-83.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3694</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Ruby before 1.8.5 allow remote attackers to bypass "safe level" checks via unspecified vectors involving (1) the alias function and (2) "directory operations".
	</description>
 </metadata>
<!-- 6afcb4d97a623f4874604c6ba352d777 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030892" comment="ruby less than 1.8.1-42.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3738</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738" source="CVE"/>
	<description>
	Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
	</description>
 </metadata>
<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033175" comment="openssl-32bit less than 9-200609270843"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033176" comment="openssl-64bit less than 9-200609270842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033177" comment="openssl-devel-32bit less than 9-200609270843"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033178" comment="openssl-devel-64bit less than 9-200609270842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033179" comment="openssl-x86 less than 9-200609271104"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3739</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739" source="CVE"/>
	<description>
	Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- d910fdfd162fc8e9041e3f41c8dcd190 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030893" comment="XFree86-server less than 4.3.99.902-43.78"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3740</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740" source="CVE"/>
	<description>
	Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.
	</description>
 </metadata>
<!-- d910fdfd162fc8e9041e3f41c8dcd190 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030893" comment="XFree86-server less than 4.3.99.902-43.78"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3741</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3741" source="CVE"/>
	<description>
	The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3745</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3745" source="CVE"/>
	<description>
	Unspecified vulnerability in the sctp_make_abort_user function in the SCTP implementation in Linux 2.6.x before 2.6.17.10 and 2.4.23 up to 2.4.33 allows local users to cause a denial of service (panic) and possibly gain root privileges via unknown attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14f276ed108cb62104b1743ee48bd92b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033196" comment="kernel-s390x less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- 261185f7ea10c374f4fc53453e6ef3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- 5ba747ab54f313a5bd8726ca99439c15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033197" comment="kernel-iseries64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033198" comment="kernel-pmac64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033199" comment="kernel-pseries64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- b8565f7473b0f60258a2da4e825025da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033200" comment="kernel-64k-pagesize less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033201" comment="kernel-debug less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033202" comment="kernel-sn2 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- d501672f20f1f468d24344550dbc92e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033203" comment="kernel-s390 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- e2ef926c5f7d109a84807c89d6446736 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030891" comment="kernel-bigsmp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033201" comment="kernel-debug less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033204" comment="kernel-um less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033205" comment="um-host-install-initrd less than 1.0-48.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033206" comment="um-host-kernel less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3746</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746" source="CVE"/>
	<description>
	Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
	</description>
 </metadata>
<!-- 8d64612d107bac165c1d9707130d521b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030902" comment="gpg less than 1.2.4-68.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3747</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747" source="CVE"/>
	<description>
	Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5d0c08a7586a4b960c62a9ab75e96a7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033220" comment="apache less than 1.3.29-71.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033221" comment="mod_ssl less than 2.8.16-71.21"/>
		</criteria>
	</criteria>
	<!-- 90eac595ae9e6c7fbeab2e05fb53a852 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032983" comment="apache2-prefork less than 2.0.49-27.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032984" comment="apache2-worker less than 2.0.49-27.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032985" comment="apache2 less than 2.0.49-27.51"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3815</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3815" source="CVE"/>
	<description>
	heartbeat.c in heartbeat before 2.0.6 sets insecure permissions in a shmget call for shared memory, which allows local users to cause an unspecified denial of service via unknown vectors, possibly during a short time window on startup.
	</description>
 </metadata>
<!-- a1db20e5a30352f1f8c0c51211d4ddd8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032907" comment="heartbeat-ldirectord less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032908" comment="heartbeat-pils less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032909" comment="heartbeat-stonith less than 1.2.5-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032910" comment="heartbeat less than 1.2.5-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3835</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835" source="CVE"/>
	<description>
	Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.
	</description>
 </metadata>
<!-- 2495ca9e3f4d48cf82846e7b51f4da79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033011" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033012" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033013" comment="jakarta-tomcat-doc less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033014" comment="jakarta-tomcat-examples less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030716" comment="jakarta-tomcat less than 5.0.19-29.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3918</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3918" source="CVE"/>
	<description>
	http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033222" comment="apache-doc less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033223" comment="apache-example-pages less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033224" comment="mod_ssl less than 2.8.16-71.26"/>
		</criteria>
	</criteria>
	<!-- 798e9e22eaf4a4eed570f26abfab9f02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032931" comment="apache2-prefork less than 2.0.49-27.59"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032932" comment="apache2-worker less than 2.0.49-27.59"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032933" comment="apache2 less than 2.0.49-27.59"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4020</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4020" source="CVE"/>
	<description>
	scanf.c in PHP 5.1.4 and earlier, and 4.4.3 and earlier, allows context-dependent attackers to execute arbitrary code via a sscanf PHP function call that performs argument swapping, which increments an index past the end of an array and triggers a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a2f0555d36498842c2e883d8fb6e27e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033127" comment="apache-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033128" comment="apache2-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033129" comment="mod_php4-core less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033130" comment="mod_php4-servlet less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033131" comment="php4-curl less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033132" comment="php4-devel less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033133" comment="php4-exif less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033134" comment="php4-fastcgi less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033135" comment="php4-gd less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033136" comment="php4-imap less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033137" comment="php4-mbstring less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033138" comment="php4-mysql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033139" comment="php4-pear less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033140" comment="php4-pgsql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033141" comment="php4-recode less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033142" comment="php4-session less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033143" comment="php4-sysvshm less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033144" comment="php4-wddx less than 4.3.4-43.66"/>
		</criteria>
	</criteria>
	<!-- 47a19c67fad7fcec4d91c5a44208bcc5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033127" comment="apache-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033128" comment="apache2-mod_php4 less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033129" comment="mod_php4-core less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033131" comment="php4-curl less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033132" comment="php4-devel less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033133" comment="php4-exif less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033134" comment="php4-fastcgi less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033135" comment="php4-gd less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033136" comment="php4-imap less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033137" comment="php4-mbstring less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033138" comment="php4-mysql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033139" comment="php4-pear less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033140" comment="php4-pgsql less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033141" comment="php4-recode less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033142" comment="php4-session less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033143" comment="php4-sysvshm less than 4.3.4-43.66"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033144" comment="php4-wddx less than 4.3.4-43.66"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4031</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4031" source="CVE"/>
	<description>
	MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy.
	</description>
 </metadata>
<!-- b91810524dc2a76e952c5b9c8a0183cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030905" comment="mysql-Max less than 4.0.18-32.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030906" comment="mysql less than 4.0.18-32.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4093</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4093" source="CVE"/>
	<description>
	Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC970 systems allows local users to cause a denial of service (crash) related to the "HID0 attention enable on PPC970 at boot time."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14f276ed108cb62104b1743ee48bd92b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033196" comment="kernel-s390x less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- 261185f7ea10c374f4fc53453e6ef3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- 5ba747ab54f313a5bd8726ca99439c15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033197" comment="kernel-iseries64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033198" comment="kernel-pmac64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033199" comment="kernel-pseries64 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- b8565f7473b0f60258a2da4e825025da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033200" comment="kernel-64k-pagesize less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033201" comment="kernel-debug less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033202" comment="kernel-sn2 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- d501672f20f1f468d24344550dbc92e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033203" comment="kernel-s390 less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
	<!-- e2ef926c5f7d109a84807c89d6446736 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030891" comment="kernel-bigsmp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033201" comment="kernel-debug less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030887" comment="kernel-default less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030888" comment="kernel-smp less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030889" comment="kernel-source less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030890" comment="kernel-syms less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033204" comment="kernel-um less than 2.6.5-7.282"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033205" comment="um-host-install-initrd less than 1.0-48.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033206" comment="um-host-kernel less than 2.6.5-7.282"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4145</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4145" source="CVE"/>
	<description>
	The Universal Disk Format (UDF) filesystem driver in Linux kernel 2.6.17 and earlier allows local users to cause a denial of service (hang and crash) via certain operations involving truncated files, as demonstrated via the dd command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4182</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4182" source="CVE"/>
	<description>
	Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.
	</description>
 </metadata>
<!-- 9052e142ab5cfd0891d67dee5c2e95e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033225" comment="clamav less than 0.88.5-0.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4250</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4250" source="CVE"/>
	<description>
	Buffer overflow in man and mandb (man-db) 2.4.3 and earlier allows local users to execute arbitrary code via crafted arguments to the -H flag.
	</description>
 </metadata>
<!-- 43ec78f2697282b2694f04befd7f14f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030910" comment="man less than 2.4.1-214.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4330</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4330" source="CVE"/>
	<description>
	Unspecified vulnerability in the SCSI dissector in Wireshark (formerly Ethereal) 0.99.2 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
	</description>
 </metadata>
<!-- ed68372df64743127152b6fa7a40a353 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033226" comment="ethereal less than 0.10.13-2.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4331</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4331" source="CVE"/>
	<description>
	Multiple off-by-one errors in the IPSec ESP preference parser in Wireshark (formerly Ethereal) 0.99.2 allow remote attackers to cause a denial of service (crash) via unspecified vectors.
	</description>
 </metadata>
<!-- ed68372df64743127152b6fa7a40a353 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033226" comment="ethereal less than 0.10.13-2.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4332</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4332" source="CVE"/>
	<description>
	Unspecified vulnerability in the DHCP dissector in Wireshark (formerly Ethereal) 0.10.13 through 0.99.2, when run on Windows, allows remote attackers to cause a denial of service (crash) via unspecified vectors that trigger a bug in Glib.
	</description>
 </metadata>
<!-- ed68372df64743127152b6fa7a40a353 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033226" comment="ethereal less than 0.10.13-2.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4333</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4333" source="CVE"/>
	<description>
	The SSCOP dissector in Wireshark (formerly Ethereal) before 0.99.3 allows remote attackers to cause a denial of service (resource consumption) via malformed packets that cause the Q.2391 dissector to use excessive memory.
	</description>
 </metadata>
<!-- ed68372df64743127152b6fa7a40a353 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033226" comment="ethereal less than 0.10.13-2.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4334</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334" source="CVE"/>
	<description>
	Unspecified vulnerability in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (crash) via a crafted GZIP (gz) archive, which results in a NULL dereference.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4335</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335" source="CVE"/>
	<description>
	Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running on certain platforms, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GZIP archive that triggers an out-of-bounds write, aka a "stack modification vulnerability."
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4336</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336" source="CVE"/>
	<description>
	Buffer underflow in the build_tree function in unpack.c in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted leaf count table that causes a write to a negative index.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4337</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337" source="CVE"/>
	<description>
	Buffer overflow in the make_table function in the LHZ component in gzip 1.3.5 allows context-dependent attackers to execute arbitrary code via a crafted decoding table in a GZIP archive.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4338</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338" source="CVE"/>
	<description>
	unlzh.c in the LHZ component in gzip 1.3.5 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted GZIP archive.
	</description>
 </metadata>
<!-- c9a04465aadc28a00f8e67df4a55f059 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030913" comment="gzip less than 1.3.5-136.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4339</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339" source="CVE"/>
	<description>
	OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5601813d23ce6bec904c8179130dc272 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030914" comment="bind-utils-32bit less than 9-200611140525"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033227" comment="bind-utils-32bit less than 9-200611142157"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033228" comment="bind-utils-64bit less than 9-200611140852"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033229" comment="bind-utils-x86 less than 9-200611140553"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030915" comment="bind-utils less than 9.2.3-76.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030916" comment="bind less than 9.2.3-76.28"/>
		</criteria>
	</criteria>
	<!-- 5ed5dd66328b2d660bce8191dbd9d7de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030917" comment="openssl-32bit less than 9-200609140529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033230" comment="openssl-32bit less than 9-200609142242"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033231" comment="openssl-64bit less than 9-200609140736"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030918" comment="openssl-devel-32bit less than 9-200609140529"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033232" comment="openssl-devel-32bit less than 9-200609142242"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033233" comment="openssl-devel-64bit less than 9-200609140736"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030919" comment="openssl-devel less than 0.9.7d-15.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033234" comment="openssl-x86 less than 9-200609141208"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030920" comment="openssl less than 0.9.7d-15.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4343</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343" source="CVE"/>
	<description>
	The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference.
	</description>
 </metadata>
<!-- 16e2a93b390a1ceb86b0945a88a4d415 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030859" comment="openssl-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033175" comment="openssl-32bit less than 9-200609270843"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033176" comment="openssl-64bit less than 9-200609270842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030860" comment="openssl-devel-32bit less than 9-200609270654"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033177" comment="openssl-devel-32bit less than 9-200609270843"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033178" comment="openssl-devel-64bit less than 9-200609270842"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030861" comment="openssl-devel less than 0.9.7d-15.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033179" comment="openssl-x86 less than 9-200609271104"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030862" comment="openssl less than 0.9.7d-15.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4434</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4434" source="CVE"/>
	<description>
	Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
	</description>
 </metadata>
<!-- 287e0bd8e5b2a251369538cb077b8643 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033235" comment="sendmail less than 8.12.11-2.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4484</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4484" source="CVE"/>
	<description>
	Buffer overflow in the LWZReadByte_ function in ext/gd/libgd/gd_gif_in.c in the GD extension in PHP before 5.1.5 allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
	</description>
 </metadata>
<!-- e7210de56ee03db74da657f036c64cc6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030921" comment="perl-Tk less than 800.024-429.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4514</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4514" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ole_info_read_metabat function in Gnome Structured File library (libgsf) 1.14.0, and other versions before 1.14.2, allows context-dependent attackers to execute arbitrary code via a large num_metabat value in an OLE document, which causes the ole_init_info function to allocate insufficient memory.
	</description>
 </metadata>
<!-- 8925f151052752a744fcfe7924249f34 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033236" comment="libgsf less than 1.8.2-164.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4538</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4538" source="CVE"/>
	<description>
	Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4573</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the "utf8 combining characters handling" (utf8_handle_comb function in encoding.c) in screen before 4.0.3 allows user-assisted attackers to cause a denial of service (crash or hang) via certain UTF8 sequences.
	</description>
 </metadata>
<!-- e192e1cbb45632e4da008b3b6243cf87 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030926" comment="screen less than 4.0.2-41.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4574</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4574" source="CVE"/>
	<description>
	Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that tragger an assertion error related to unexpected length values.
	</description>
 </metadata>
<!-- c4745f0c0b9184f32b2201f189dc66f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033237" comment="ethereal less than 0.10.13-2.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4600</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4600" source="CVE"/>
	<description>
	slapd in OpenLDAP before 2.3.25 allows remote authenticated users with selfwrite Access Control List (ACL) privileges to modify arbitrary Distinguished Names (DN).
	</description>
 </metadata>
<!-- 9609dd5032a2ada02a8800965fa511b2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030927" comment="openldap2 less than 2.2.24-4.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4625</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4625" source="CVE"/>
	<description>
	PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.
	</description>
 </metadata>
<!-- 18ce0ef65eb3f8c4c6da71f27f4397cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033238" comment="apache-mod_php4 less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033239" comment="apache2-mod_php4 less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033240" comment="mod_php4-core less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033241" comment="mod_php4-servlet less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033242" comment="php4-curl less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033243" comment="php4-devel less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033244" comment="php4-exif less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033245" comment="php4-fastcgi less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033246" comment="php4-gd less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033247" comment="php4-imap less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033248" comment="php4-mbstring less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033249" comment="php4-mysql less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033250" comment="php4-pear less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033251" comment="php4-pgsql less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033252" comment="php4-recode less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033253" comment="php4-session less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033254" comment="php4-sysvshm less than 4.3.4-43.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033255" comment="php4-wddx less than 4.3.4-43.69"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4790</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4790" source="CVE"/>
	<description>
	verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1eb852e54561e6d6fdfa9598ad260a7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030928" comment="gnutls-devel less than 1.0.8-26.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030929" comment="gnutls less than 1.0.8-26.10"/>
		</criteria>
	</criteria>
	<!-- f5b3f5adf5613e923c01c813a0923b58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033256" comment="IBMJava2-JRE less than 1.4.2-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033257" comment="IBMJava2-SDK less than 1.4.2-0.76"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4805</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4805" source="CVE"/>
	<description>
	epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded.
	</description>
 </metadata>
<!-- c4745f0c0b9184f32b2201f189dc66f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033237" comment="ethereal less than 0.10.13-2.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4810</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4810" source="CVE"/>
	<description>
	Buffer overflow in the readline function in util/texindex.c, as used by the (1) texi2dvi and (2) texindex commands, in texinfo 4.8 and earlier allows local users to execute arbitrary code via a crafted Texinfo file.
	</description>
 </metadata>
<!-- f14a053a1c56609caedf6846afdcdd16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030932" comment="texinfo less than 4.6-61.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4811</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811" source="CVE"/>
	<description>
	Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
	</description>
 </metadata>
<!-- 595ed8e88dd0e76ba4d62c4bb475e623 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030933" comment="qt3-32bit less than 9-200610230741"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033258" comment="qt3-32bit less than 9-200610231629"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033259" comment="qt3-64bit less than 9-200610230717"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030934" comment="qt3-devel-32bit less than 9-200610230741"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033260" comment="qt3-devel-32bit less than 9-200610231629"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033261" comment="qt3-devel-64bit less than 9-200610230717"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030935" comment="qt3-devel-doc less than 3.3.1-36.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030936" comment="qt3-devel less than 3.3.1-36.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030937" comment="qt3-non-mt less than 3.3.1-41.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033262" comment="qt3-x86 less than 9-200610231048"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030938" comment="qt3 less than 3.3.1-36.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4813</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4813" source="CVE"/>
	<description>
	The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4924</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4924" source="CVE"/>
	<description>
	sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4925</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4925" source="CVE"/>
	<description>
	packet.c in ssh in OpenSSH allows remote attackers to cause a denial of service (crash) by sending an invalid protocol sequence with USERAUTH_SUCCESS before NEWKEYS, which causes newkeys[mode] to be NULL.
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4965</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4965" source="CVE"/>
	<description>
	Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain.  NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4980</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980" source="CVE"/>
	<description>
	Buffer overflow in the repr function in Python 2.3 through 2.6 before 20060822 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via crafted wide character UTF-32/UCS-4 strings to certain scripts.
	</description>
 </metadata>
<!-- c068fdf79cae7d7c51cab673cf24c1b6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030941" comment="python-32bit less than 9-200610132325"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033263" comment="python-32bit less than 9-200610141314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033264" comment="python-64bit less than 9-200610151241"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030942" comment="python-devel less than 2.3.3-88.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033265" comment="python-x86 less than 9-200610140253"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030943" comment="python less than 2.3.3-88.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4997</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4997" source="CVE"/>
	<description>
	The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5051</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051" source="CVE"/>
	<description>
	Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5052</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5052" source="CVE"/>
	<description>
	Unspecified vulnerability in portable OpenSSH before 4.4, when running on some platforms, allows remote attackers to determine the validity of usernames via unknown vectors involving a GSSAPI "authentication abort."
	</description>
 </metadata>
<!-- 05412985c36daeff0c33b88942b68c2c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030939" comment="openssh-askpass less than 4.1p1-11.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030940" comment="openssh less than 4.1p1-11.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5170</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170" source="CVE"/>
	<description>
	pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
	</description>
 </metadata>
<!-- 24da01b634bfff963111019a1b725dca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030944" comment="pam_ldap-32bit less than 9-200610241503"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033266" comment="pam_ldap-32bit less than 9-200610241633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033267" comment="pam_ldap-64bit less than 9-200610241608"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033268" comment="pam_ldap-x86 less than 9-200610241452"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030945" comment="pam_ldap less than 169-28.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5174</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5174" source="CVE"/>
	<description>
	The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5295</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5295" source="CVE"/>
	<description>
	Unspecified vulnerability in ClamAV before 0.88.5 allows remote attackers to cause a denial of service (scanning service crash) via a crafted Compressed HTML Help (CHM) file that causes ClamAV to "read an invalid memory location."
	</description>
 </metadata>
<!-- 9052e142ab5cfd0891d67dee5c2e95e6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033225" comment="clamav less than 0.88.5-0.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5465</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465" source="CVE"/>
	<description>
	Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
	</description>
 </metadata>
<!-- 2a0a69ad2fa154c13d238e3177db3736 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033269" comment="apache-mod_php4 less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033270" comment="apache2-mod_php4 less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033271" comment="mod_php4-core less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033272" comment="mod_php4-servlet less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033273" comment="php4-curl less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033274" comment="php4-devel less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033275" comment="php4-exif less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033276" comment="php4-fastcgi less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033277" comment="php4-gd less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033278" comment="php4-imap less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033279" comment="php4-mbstring less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033280" comment="php4-mysql less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033281" comment="php4-pear less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033282" comment="php4-pgsql less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033283" comment="php4-recode less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033284" comment="php4-session less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033285" comment="php4-sysvshm less than 4.3.4-43.72"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033286" comment="php4-wddx less than 4.3.4-43.72"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5467</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5467" source="CVE"/>
	<description>
	The cgi.rb CGI library for Ruby 1.8 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an HTTP request with a multipart MIME body that contains an invalid boundary specifier, as demonstrated using a specifier that begins with a "-" instead of "--" and contains an inconsistent ID.
	</description>
 </metadata>
<!-- 9f7246de37b3edd912705a13b8498270 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030953" comment="ruby less than 1.8.1-42.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5468</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5468" source="CVE"/>
	<description>
	Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via unspecified vectors.
	</description>
 </metadata>
<!-- c4745f0c0b9184f32b2201f189dc66f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033237" comment="ethereal less than 0.10.13-2.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5469</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5469" source="CVE"/>
	<description>
	Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference.
	</description>
 </metadata>
<!-- c4745f0c0b9184f32b2201f189dc66f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033237" comment="ethereal less than 0.10.13-2.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5540</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5540" source="CVE"/>
	<description>
	backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via certain aggregate functions in an UPDATE statement, which are not properly handled during a "MIN/MAX index optimization."
	</description>
 </metadata>
<!-- 59650c03a8bc5ae310cd7898bd106ad2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030954" comment="postgresql-contrib less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030955" comment="postgresql-devel less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030956" comment="postgresql-docs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033287" comment="postgresql-libs-32bit less than 9-200611152043"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030957" comment="postgresql-libs-32bit less than 9-200611160118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033288" comment="postgresql-libs-64bit less than 9-200611151828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033289" comment="postgresql-libs-x86 less than 9-200611160110"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030958" comment="postgresql-libs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030959" comment="postgresql-pl less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030960" comment="postgresql-server less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030961" comment="postgresql less than 7.4.13-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5541</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5541" source="CVE"/>
	<description>
	backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x before 8.0.9, and 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) via a coercion of an unknown element to ANYARRAY.
	</description>
 </metadata>
<!-- 59650c03a8bc5ae310cd7898bd106ad2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030954" comment="postgresql-contrib less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030955" comment="postgresql-devel less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030956" comment="postgresql-docs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033287" comment="postgresql-libs-32bit less than 9-200611152043"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030957" comment="postgresql-libs-32bit less than 9-200611160118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033288" comment="postgresql-libs-64bit less than 9-200611151828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033289" comment="postgresql-libs-x86 less than 9-200611160110"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030958" comment="postgresql-libs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030959" comment="postgresql-pl less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030960" comment="postgresql-server less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030961" comment="postgresql less than 7.4.13-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5542</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5542" source="CVE"/>
	<description>
	backend/tcop/postgres.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service (daemon crash) related to duration logging of V3-protocol Execute messages for (1) COMMIT and (2) ROLLBACK SQL statements.
	</description>
 </metadata>
<!-- 59650c03a8bc5ae310cd7898bd106ad2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030954" comment="postgresql-contrib less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030955" comment="postgresql-devel less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030956" comment="postgresql-docs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033287" comment="postgresql-libs-32bit less than 9-200611152043"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030957" comment="postgresql-libs-32bit less than 9-200611160118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033288" comment="postgresql-libs-64bit less than 9-200611151828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033289" comment="postgresql-libs-x86 less than 9-200611160110"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030958" comment="postgresql-libs less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030959" comment="postgresql-pl less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030960" comment="postgresql-server less than 7.4.13-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030961" comment="postgresql less than 7.4.13-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5601</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5601" source="CVE"/>
	<description>
	Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- e03f8d729eccecca3c8d55e3fb9fc06f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030962" comment="xsupplicant less than 1.2.8-14.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5648</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5648" source="CVE"/>
	<description>
	Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5649</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5649" source="CVE"/>
	<description>
	Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5740</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5740" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet.
	</description>
 </metadata>
<!-- c4745f0c0b9184f32b2201f189dc66f6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033237" comment="ethereal less than 0.10.13-2.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5749</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5749" source="CVE"/>
	<description>
	The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5752</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033290" comment="apache2-doc less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033291" comment="apache2-example-pages less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5753</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5753" source="CVE"/>
	<description>
	Unspecified vulnerability in the listxattr system call in Linux kernel, when a "bad inode" is present, allows local users to cause a denial of service (data corruption) and possibly gain privileges via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5754</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5754" source="CVE"/>
	<description>
	The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5757</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5757" source="CVE"/>
	<description>
	Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5779</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5779" source="CVE"/>
	<description>
	OpenLDAP before 2.3.29 allows remote attackers to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
	</description>
 </metadata>
<!-- bb15de3abad130715a6d95ac3c49fde6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030968" comment="openldap2-client-32bit less than 9-200611171828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033292" comment="openldap2-client-32bit less than 9-200611180315"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033293" comment="openldap2-client-64bit less than 9-200611171843"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033294" comment="openldap2-client-x86 less than 9-200611171910"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030969" comment="openldap2-client less than 2.2.24-4.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5793</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793" source="CVE"/>
	<description>
	The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
	</description>
 </metadata>
<!-- e998029189ef39123c667f390933f7c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033185" comment="libpng-32bit less than 9-200612010114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030875" comment="libpng-32bit less than 9-200612010115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033186" comment="libpng-64bit less than 9-200612010055"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030876" comment="libpng-devel less than 1.2.5-182.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033187" comment="libpng-x86 less than 9-200612010114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030877" comment="libpng less than 1.2.5-182.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5794</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794" source="CVE"/>
	<description>
	Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
	</description>
 </metadata>
<!-- 786c6a467b067c5cf9844349ee6f7593 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030970" comment="openssh-askpass less than 4.1p1-11.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030971" comment="openssh less than 4.1p1-11.34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5823</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5823" source="CVE"/>
	<description>
	The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via a malformed filesystem that uses zlib compression that triggers memory corruption, as demonstrated using cramfs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5857</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857" source="CVE"/>
	<description>
	Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file that triggers memory corruption and overwrites a subroutine pointer during rendering.
	</description>
 </metadata>
<!-- 14f5542bd4da8ef488264255763b04a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033295" comment="acroread less than 7.0.9-2.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5864</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5864" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers.  NOTE: this issue can be exploited through other products that use gv such as evince.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9de061ea9e316c4f70d52043d835a259 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030973" comment="gv less than 3.5.8-1129.10"/>
	</criteria>
	<!-- a742cbcb7f25ec6b37cc65f865d2b4e9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030974" comment="gv less than 3.5.8-1129.8"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5867</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5867" source="CVE"/>
	<description>
	fetchmail before 6.3.6-rc4 does not properly enforce TLS and may transmit cleartext passwords over unsecured links if certain circumstances occur, which allows remote attackers to obtain sensitive information via man-in-the-middle (MITM) attacks.
	</description>
 </metadata>
<!-- 460569ff05f9f1dd9cb03924fffb9bda -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030726" comment="fetchmail less than 6.2.5-49.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5871</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5871" source="CVE"/>
	<description>
	smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x before 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5874</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5874" source="CVE"/>
	<description>
	Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference.
	</description>
 </metadata>
<!-- 99ff98254c77739e0c421ee90228d262 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033296" comment="clamav less than 0.88.7-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5876</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5876" source="CVE"/>
	<description>
	The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43c2764245ef7a05f0cab984e5b33b81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031004" comment="libredcarpet-python less than 2.4.9-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031005" comment="libredcarpet-tools less than 2.4.9-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031006" comment="libredcarpet less than 2.4.9-1.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031007" comment="python-openssl less than 0.6-3.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031008" comment="rcd-devel less than 2.4.9-1.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031009" comment="rcd-modules-devel less than 2.4.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031010" comment="rcd-modules less than 2.4.9-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031011" comment="rcd less than 2.4.9-1.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031012" comment="red-carpet less than 2.4.9-1.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031013" comment="rug less than 2.4.9-1.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031014" comment="xmlrpc-c-devel less than 0.9.10-21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031015" comment="xmlrpc-c less than 0.9.10-21.3"/>
		</criteria>
	</criteria>
	<!-- 6eb62a9fe299da1a7b971369073667b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031018" comment="libsoup-devel less than 2.2.3-0.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031019" comment="libsoup less than 2.2.3-0.20"/>
		</criteria>
	</criteria>
	<!-- 92e17caf47363ae1d1347db4ef250fa7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031020" comment="rcd-devel less than 2.4.9-1.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031021" comment="rcd less than 2.4.9-1.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5974</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5974" source="CVE"/>
	<description>
	fetchmail 6.3.5 and 6.3.6 before 6.3.6-rc4, when refusing a message delivered via the mda option, allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference when calling the (1) ferror or (2) fflush functions.
	</description>
 </metadata>
<!-- 460569ff05f9f1dd9cb03924fffb9bda -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030726" comment="fetchmail less than 6.2.5-49.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6053</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6053" source="CVE"/>
	<description>
	The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6054</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6054" source="CVE"/>
	<description>
	The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6056</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6056" source="CVE"/>
	<description>
	Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6060</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6060" source="CVE"/>
	<description>
	The NTFS filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly other versions, allows local users to cause a denial of service (CPU consumption) via a malformed NTFS file stream that triggers an infinite loop in the __find_get_block_slow function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 36b4bba8bf8a44877f22acb24254f105 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033209" comment="kernel-s390 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 4ea26fcc1ac12ca4ae3124c429ea7994 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030898" comment="kernel-bigsmp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033211" comment="kernel-um less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033212" comment="um-host-install-initrd less than 1.0-48.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033213" comment="um-host-kernel less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 7ac58979c59cf50840e70f4bc277e4f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033214" comment="kernel-64k-pagesize less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033210" comment="kernel-debug less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033215" comment="kernel-sn2 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- 8256ebb61cc00811a06c0fd252c18d5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- dc588035c8569c0fba9c9e33685f698c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033216" comment="kernel-s390x less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
	<!-- f74c89856bd24e4e5b10b44a1b7fb438 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030894" comment="kernel-default less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033217" comment="kernel-iseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033218" comment="kernel-pmac64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033219" comment="kernel-pseries64 less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030895" comment="kernel-smp less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030896" comment="kernel-source less than 2.6.5-7.283"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030897" comment="kernel-syms less than 2.6.5-7.283"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6077</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6077" source="CVE"/>
	<description>
	The (1) Password Manager in Mozilla Firefox 2.0, and 1.5.0.8 and earlier; and the (2) Passcard Manager in Netscape 8.1.2 and possibly other versions, do not properly verify that an ACTION URL in a FORM element containing a password INPUT element matches the web site for which the user stored a password, which allows remote attackers to obtain passwords via a password INPUT element on a different web page located on the web site intended for this password.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6097</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097" source="CVE"/>
	<description>
	GNU tar 1.16 and 1.15.1, and possibly other versions, allows user-assisted attackers to overwrite arbitrary files via a tar file that contains a GNUTYPE_NAMES record with a symbolic link, which is not properly handled by the extract_archive function in extract.c and extract_mangle function in mangle.c, a variant of CVE-2002-1216.
	</description>
 </metadata>
<!-- 31a48f9cdcff5ec4b2d367c86e31da9d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031034" comment="tar less than 1.13.25-325.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6101</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.
	</description>
 </metadata>
<!-- 3806664392b7217bd698fe6e5213851c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031035" comment="XFree86-server less than 4.3.99.902-43.82"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6102</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
<!-- 3806664392b7217bd698fe6e5213851c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031035" comment="XFree86-server less than 4.3.99.902-43.82"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6103</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
<!-- 3806664392b7217bd698fe6e5213851c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031035" comment="XFree86-server less than 4.3.99.902-43.82"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6106</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6106" source="CVE"/>
	<description>
	Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6169</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6169" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ask_outfile_name function in openfile.c for GnuPG (gpg) 1.4 and 2.0, when running interactively, might allow attackers to execute arbitrary code via messages with "C-escape" expansions, which cause the make_printable_string function to return a longer string than expected while constructing a prompt.
	</description>
 </metadata>
<!-- 440643b5b7f99c513f043f911ca9d906 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031036" comment="gpg less than 1.2.4-68.22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6235</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6235" source="CVE"/>
	<description>
	A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
	</description>
 </metadata>
<!-- 440643b5b7f99c513f043f911ca9d906 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031036" comment="gpg less than 1.2.4-68.22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6297</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6297" source="CVE"/>
	<description>
	Stack consumption vulnerability in the KFILE JPEG (kfile_jpeg) plugin in kdegraphics 3, as used by konqueror, digikam, and other KDE image browsers, allows remote attackers to cause a denial of service (stack consumption) via a crafted EXIF section in a JPEG file, which results in an infinite recursion.
	</description>
 </metadata>
<!-- 017cc98e150d608e083aaf6fed65f033 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031038" comment="kdegraphics3 less than 3.2.1-67.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6303</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6303" source="CVE"/>
	<description>
	The read_multipart function in cgi.rb in Ruby before 1.8.5-p2 does not properly detect boundaries in MIME multipart content, which allows remote attackers to cause a denial of service (infinite loop) via crafted HTTP requests, a different issue than CVE-2006-5467.
	</description>
 </metadata>
<!-- b9b7d69cac6ba0eb8c7fb702bdc1ef88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031039" comment="ruby less than 1.8.1-42.22"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6383</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6383" source="CVE"/>
	<description>
	PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
	</description>
 </metadata>
<!-- 9331ab8ca1a0615674f5dd979bd4b413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033298" comment="apache-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033299" comment="apache2-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033300" comment="mod_php4-core less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033301" comment="mod_php4-servlet less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033302" comment="php4-devel less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033303" comment="php4-exif less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033304" comment="php4-fastcgi less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033305" comment="php4-imap less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033306" comment="php4-mhash less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033307" comment="php4-mysql less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033308" comment="php4-pear less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033309" comment="php4-session less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033310" comment="php4-sysvshm less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033311" comment="php4-unixODBC less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033312" comment="php4-wddx less than 4.3.4-43.75"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6406</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6406" source="CVE"/>
	<description>
	Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to bypass virus detection by inserting invalid characters into base64 encoded content in a multipart/mixed MIME file, as demonstrated with the EICAR test file.
	</description>
 </metadata>
<!-- 99ff98254c77739e0c421ee90228d262 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033296" comment="clamav less than 0.88.7-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6481</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6481" source="CVE"/>
	<description>
	Clam AntiVirus (ClamAV) 0.88.6 allows remote attackers to cause a denial of service (stack overflow and application crash) by wrapping many layers of multipart/mixed content around a document, a different vulnerability than CVE-2006-5874 and CVE-2006-6406.
	</description>
 </metadata>
<!-- 99ff98254c77739e0c421ee90228d262 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033296" comment="clamav less than 0.88.7-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6535</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6535" source="CVE"/>
	<description>
	The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead to data corruption and "node lockups."  NOTE: it is not clear whether this issue is exploitable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6731</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731" source="CVE"/>
	<description>
	Multiple buffer overflows in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allow attackers to develop Java applets that read, write, or execute local files, possibly related to (1) integer overflows in the Java_sun_awt_image_ImagingLib_convolveBI, awt_parseRaster, and awt_parseColorModel functions; (2) a stack overflow in the Java_sun_awt_image_ImagingLib_lookupByteRaster function; and (3) improper handling of certain negative values in the Java_sun_font_SunLayoutEngine_nativeLayout function.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033313" comment="java2-jre less than 1.3.1-216.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033314" comment="java2 less than 1.3.1-216.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6736</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 6 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to "access data in other applets," aka "The second issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3012728a973846dec5946ec81fd01aca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033315" comment="IBMJava2-JRE less than 1.4.2-0.90"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033316" comment="IBMJava2-SDK less than 1.4.2-0.90"/>
		</criteria>
	</criteria>
	<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033313" comment="java2-jre less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033314" comment="java2 less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6737</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 5 and earlier, Java System Development Kit (SDK) and JRE 1.4.2_10 and earlier 1.4.x versions, and SDK and JRE 1.3.1_18 and earlier allows attackers to use untrusted applets to "access data in other applets," aka "The first issue."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3012728a973846dec5946ec81fd01aca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033315" comment="IBMJava2-JRE less than 1.4.2-0.90"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033316" comment="IBMJava2-SDK less than 1.4.2-0.90"/>
		</criteria>
	</criteria>
	<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033313" comment="java2-jre less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033314" comment="java2 less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6745</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Sun Java Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 7 and earlier, and Java System Development Kit (SDK) and JRE 1.4.2_12 and earlier 1.4.x versions, allow attackers to develop Java applets or applications that are able to gain privileges, related to serialization in JRE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3012728a973846dec5946ec81fd01aca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033315" comment="IBMJava2-JRE less than 1.4.2-0.90"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033316" comment="IBMJava2-SDK less than 1.4.2-0.90"/>
		</criteria>
	</criteria>
	<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033313" comment="java2-jre less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033314" comment="java2 less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6772</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6772" source="CVE"/>
	<description>
	Format string vulnerability in the inputAnswer function in file.c in w3m before 0.5.2, when run with the dump or backend option, allows remote attackers to execute arbitrary code via format string specifiers in the Common Name (CN) field of an SSL certificate associated with an https URL.
	</description>
 </metadata>
<!-- 68d7a138079c9fa4fa2b1defabd0c5ab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031044" comment="w3m less than 0.4.1_m17n_20030308-201.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7203</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-7203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7203" source="CVE"/>
	<description>
	The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7224</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-7224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7224" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-7227, CVE-2005-4872, CVE-2006-7228.  Reason: this candidate was SPLIT into other identifiers in order to reflect different affected versions and distinct vendor fixes.  Notes: All CVE users should consult CVE-2006-7227, CVE-2005-4872, and CVE-2006-7228 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033317" comment="pcre-32bit less than 9-200711150230"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033318" comment="pcre-64bit less than 9-200711150231"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033319" comment="pcre-x86 less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
	<!-- f3cf1435d12b7ef88a846de203195e0c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031094" comment="apache2-devel less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033324" comment="apache2-doc less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033325" comment="apache2-example-pages less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031095" comment="apache2-prefork less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031096" comment="apache2-worker less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031097" comment="apache2 less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031093" comment="libapr0 less than 2.0.59-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7225</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-7225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 6.7 allows context-dependent attackers to cause a denial of service (error or crash) via a regular expression that involves a "malformed POSIX character class", as demonstrated via an invalid character after a [[ sequence.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033317" comment="pcre-32bit less than 9-200711150230"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033318" comment="pcre-64bit less than 9-200711150231"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033319" comment="pcre-x86 less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7226</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-7226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent attackers to cause a denial of service (error or crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033317" comment="pcre-32bit less than 9-200711150230"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033318" comment="pcre-64bit less than 9-200711150231"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033319" comment="pcre-x86 less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7228</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-7228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7228" source="CVE"/>
	<description>
	Integer overflow in Perl-Compatible Regular Expression (PCRE) library before 6.7 might allow context-dependent attackers to execute arbitrary code via a regular expression that involves large (1) min, (2) max, or (3) duplength values that cause an incorrect length calculation and trigger a buffer overflow, a different vulnerability than CVE-2006-7227.  NOTE: this issue was originally subsumed by CVE-2006-7224, but that CVE has been REJECTED and split.
	</description>
 </metadata>
<!-- b5ee8d570837e8d054b4dc0125fb4447 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032920" comment="python-32bit less than 9-200712110029"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030647" comment="python-32bit less than 9-200712110030"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032921" comment="python-64bit less than 9-200712110033"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030648" comment="python-curses less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030649" comment="python-demo less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030650" comment="python-devel less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030651" comment="python-doc-pdf less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030652" comment="python-doc less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030653" comment="python-gdbm less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030654" comment="python-idle less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030655" comment="python-mpz less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030656" comment="python-tk less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032922" comment="python-x86 less than 9-200712110030"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030657" comment="python-xml less than 2.3.3-88.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030658" comment="python less than 2.3.3-88.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7230</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-7230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7230" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate the amount of memory needed for a compiled regular expression pattern when the (1) -x or (2) -i UTF-8 options change within the pattern, which allows context-dependent attackers to cause a denial of service (PCRE or glibc crash) via crafted regular expressions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73795549f9a608bace82f0cf345b3a42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033326" comment="pcre-32bit less than 9-200711270033"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031098" comment="pcre-32bit less than 9-200711270035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033327" comment="pcre-64bit less than 9-200711270034"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031099" comment="pcre-devel less than 4.4-109.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033328" comment="pcre-x86 less than 9-200711270035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031100" comment="pcre less than 4.4-109.12"/>
		</criteria>
	</criteria>
	<!-- 9992478cea3704f6f2c2f7741f3e12e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031101" comment="pcre-32bit less than 9-200711192343"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033329" comment="pcre-32bit less than 9-200711192344"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033330" comment="pcre-64bit less than 9-200711192338"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031102" comment="pcre-devel less than 4.4-109.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033331" comment="pcre-x86 less than 9-200711192343"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031103" comment="pcre less than 4.4-109.10"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7232</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-7232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7232" source="CVE"/>
	<description>
	sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
	</description>
 </metadata>
<!-- 30a5e3996d30fa92e0adac8c1dafa7ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031104" comment="mysql-Max less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031106" comment="mysql-client less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031107" comment="mysql-devel less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031108" comment="mysql-shared less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031109" comment="mysql less than 4.0.18-32.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0008</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0008" source="CVE"/>
	<description>
	Integer underflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, SeaMonkey before 1.0.8, Thunderbird before 1.5.0.10, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via a crafted SSLv2 server message containing a public key that is too short to encrypt the "Master Secret", which results in a heap-based overflow.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0009</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0009" source="CVE"/>
	<description>
	Stack-based buffer overflow in the SSLv2 support in Mozilla Network Security Services (NSS) before 3.11.5, as used by Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, SeaMonkey before 1.0.8, and certain Sun Java System server products before 20070611, allows remote attackers to execute arbitrary code via invalid "Client Master Key" length values.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0010</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010" source="CVE"/>
	<description>
	The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.
	</description>
 </metadata>
<!-- 386ec98ac7b826625ed55a4d3b4d0f8e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033332" comment="gtk2-32bit less than 9-200701181648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033333" comment="gtk2-32bit less than 9-200701181719"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033334" comment="gtk2-64bit less than 9-200701181729"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033335" comment="gtk2-devel less than 2.2.4-125.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033336" comment="gtk2-doc less than 2.2.4-125.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033337" comment="gtk2-x86 less than 9-200701181805"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033338" comment="gtk2 less than 2.2.4-125.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0044</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka "Universal CSRF and session riding."
	</description>
 </metadata>
<!-- 14f5542bd4da8ef488264255763b04a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033295" comment="acroread less than 7.0.9-2.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0045</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, for Mozilla Firefox, Microsoft Internet Explorer 6 SP1, Google Chrome, Opera 8.5.4 build 770, and Opera 9.10.8679 on Windows allow remote attackers to inject arbitrary JavaScript and conduct other attacks via a .pdf URL with a javascript: or res: URI with (1) FDF, (2) XML, and (3) XFDF AJAX parameters, or (4) an arbitrarily named name=URI anchor identifier, aka "Universal XSS (UXSS)."
	</description>
 </metadata>
<!-- 14f5542bd4da8ef488264255763b04a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033295" comment="acroread less than 7.0.9-2.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0046</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046" source="CVE"/>
	<description>
	Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows remote attackers to execute arbitrary code by causing an error via a javascript: URI call to document.write in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
	</description>
 </metadata>
<!-- 14f5542bd4da8ef488264255763b04a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033295" comment="acroread less than 7.0.9-2.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0047</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0047" source="CVE"/>
	<description>
	CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
	</description>
 </metadata>
<!-- 14f5542bd4da8ef488264255763b04a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033295" comment="acroread less than 7.0.9-2.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0048</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048" source="CVE"/>
	<description>
	Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
	</description>
 </metadata>
<!-- 14f5542bd4da8ef488264255763b04a4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033295" comment="acroread less than 7.0.9-2.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0062</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062" source="CVE"/>
	<description>
	Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528; allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a malformed DHCP packet with a large dhcp-max-message-size that triggers a stack-based buffer overflow, related to servers configured to send many DHCP options to clients.
	</description>
 </metadata>
<!-- 8aa275881d1d7b1a245784e2927facfe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031146" comment="dhcp-client less than 3.0.1rc13-28.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031147" comment="dhcp-devel less than 3.0.1rc13-28.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033339" comment="dhcp-relay less than 3.0.1rc13-28.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031148" comment="dhcp-server less than 3.0.1rc13-28.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031149" comment="dhcp less than 3.0.1rc13-28.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0104</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0104" source="CVE"/>
	<description>
	The Adobe PDF specification 1.3, as implemented by (a) xpdf 3.0.1 patch 2, (b) kpdf in KDE before 3.5.5, (c) poppler before 0.5.4, and other products, allows remote attackers to have an unknown impact, possibly including denial of service (infinite loop), arbitrary code execution, or memory corruption, via a PDF file with a (1) crafted catalog dictionary or (2) a crafted Pages attribute that references an invalid page tree node.
	</description>
 </metadata>
<!-- 0dcf9e4dc102ecae87adf32d49e1f209 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031151" comment="cups-client less than 1.1.20-108.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031152" comment="cups-devel less than 1.1.20-108.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033340" comment="cups-libs-32bit less than 9-200701262000"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031153" comment="cups-libs-32bit less than 9-200701262020"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033341" comment="cups-libs-64bit less than 9-200701262225"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033342" comment="cups-libs-x86 less than 9-200701262117"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031154" comment="cups-libs less than 1.1.20-108.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031155" comment="cups less than 1.1.20-108.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0234</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0234" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-0243.  Reason: This candidate is a duplicate of CVE-2007-0243.  Notes: All CVE users should reference CVE-2007-0243 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033313" comment="java2-jre less than 1.3.1-216.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033314" comment="java2 less than 1.3.1-216.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0235</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0235" source="CVE"/>
	<description>
	Stack-based buffer overflow in the glibtop_get_proc_map_s function in libgtop before 2.14.6 (libgtop2) allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a process with a long filename that is mapped in its address space, which triggers the overflow in gnome-system-monitor.
	</description>
 </metadata>
<!-- c802127d6a5504c08d748f33989907ae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033343" comment="libgtop-devel less than 2.0.8-57.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033344" comment="libgtop less than 2.0.8-57.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0242</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0242" source="CVE"/>
	<description>
	The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.
	</description>
 </metadata>
<!-- d4960c566fc2d6cc52d9e79c8619cb09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033345" comment="qt3-32bit less than 9-200704031603"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031159" comment="qt3-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033346" comment="qt3-64bit less than 9-200704031815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033347" comment="qt3-devel-32bit less than 9-200704031603"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031160" comment="qt3-devel-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033348" comment="qt3-devel-64bit less than 9-200704031815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031161" comment="qt3-devel less than 3.3.1-36.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031162" comment="qt3-non-mt less than 3.3.1-41.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033349" comment="qt3-x86 less than 9-200704031929"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031163" comment="qt3 less than 3.3.1-36.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0243</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0243" source="CVE"/>
	<description>
	Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier, and SDK and JRE 1.3.1_18 and earlier allows applets to gain privileges via a GIF image with a block with a 0 width field, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3012728a973846dec5946ec81fd01aca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033315" comment="IBMJava2-JRE less than 1.4.2-0.90"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033316" comment="IBMJava2-SDK less than 1.4.2-0.90"/>
		</criteria>
	</criteria>
	<!-- 90864743019d987b918e58f9bba908b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
		</criteria>
	</criteria>
	<!-- b61d3cf1f87c35751e465d9d7a361d47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033313" comment="java2-jre less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031042" comment="java2-jre less than 1.4.2-129.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033314" comment="java2 less than 1.3.1-216.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031043" comment="java2 less than 1.4.2-129.27"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0247</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247" source="CVE"/>
	<description>
	squid/src/ftp.c in Squid before 2.6.STABLE7 allows remote FTP servers to cause a denial of service (core dump) via crafted FTP directory listing responses, possibly related to the (1) ftpListingFinish and (2) ftpHtmlifyListEntry functions.
	</description>
 </metadata>
<!-- e4f5424c0eb495e52b8739b57f62405b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033350" comment="squid less than 2.5.STABLE5-42.50"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0248</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0248" source="CVE"/>
	<description>
	The aclMatchExternal function in Squid before 2.6.STABLE7 allows remote attackers to cause a denial of service (crash) by causing an external_acl queue overload, which triggers an infinite loop.
	</description>
 </metadata>
<!-- e4f5424c0eb495e52b8739b57f62405b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033350" comment="squid less than 2.5.STABLE5-42.50"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0450</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0450" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
	</description>
 </metadata>
<!-- 63490b4245c63cb9b560c819f48e0d9d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033351" comment="jakarta-tomcat less than 5.0.19-29.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0452</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452" source="CVE"/>
	<description>
	smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.
	</description>
 </metadata>
<!-- 75665d46b2b2dc409e252b880a1ad2f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031195" comment="samba less than 3.0.20b-3.14"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0537</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0537" source="CVE"/>
	<description>
	The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML comments, which allows remote attackers to conduct cross-site scripting (XSS) attacks and bypass some XSS protection schemes by embedding certain HTML tags within a comment in a title tag, a related issue to CVE-2007-0478.
	</description>
 </metadata>
<!-- bf7f3f26a29a4c24de3b8f0e3e664432 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033352" comment="kdelibs3-32bit less than 9-200704031603"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031196" comment="kdelibs3-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033353" comment="kdelibs3-64bit less than 9-200704031815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031197" comment="kdelibs3-devel less than 3.2.1-44.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033354" comment="kdelibs3-x86 less than 9-200704031929"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031198" comment="kdelibs3 less than 3.2.1-44.69"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0555</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0555" source="CVE"/>
	<description>
	PostgreSQL 7.3 before 7.3.13, 7.4 before 7.4.16, 8.0 before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 allows attackers to disable certain checks for the data types of SQL function arguments, which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content.
	</description>
 </metadata>
<!-- a683ebb4ed6958b81e0e01344558249f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031199" comment="postgresql-contrib less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031200" comment="postgresql-devel less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031201" comment="postgresql-docs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033355" comment="postgresql-libs-32bit less than 9-200704271719"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031202" comment="postgresql-libs-32bit less than 9-200704271846"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033356" comment="postgresql-libs-64bit less than 9-200704271746"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033357" comment="postgresql-libs-x86 less than 9-200704271902"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031203" comment="postgresql-libs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031204" comment="postgresql-pl less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031205" comment="postgresql-server less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031206" comment="postgresql less than 7.4.17-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0556</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0556" source="CVE"/>
	<description>
	The query planner in PostgreSQL before 8.0.11, 8.1 before 8.1.7, and 8.2 before 8.2.2 does not verify that a table is compatible with a "previously made query plan," which allows remote authenticated users to cause a denial of service (server crash) and possibly access database content via an "ALTER COLUMN TYPE" SQL statement, which can be leveraged to read arbitrary memory from the server.
	</description>
 </metadata>
<!-- a683ebb4ed6958b81e0e01344558249f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031199" comment="postgresql-contrib less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031200" comment="postgresql-devel less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031201" comment="postgresql-docs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033355" comment="postgresql-libs-32bit less than 9-200704271719"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031202" comment="postgresql-libs-32bit less than 9-200704271846"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033356" comment="postgresql-libs-64bit less than 9-200704271746"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033357" comment="postgresql-libs-x86 less than 9-200704271902"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031203" comment="postgresql-libs less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031204" comment="postgresql-pl less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031205" comment="postgresql-server less than 7.4.17-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031206" comment="postgresql less than 7.4.17-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0653</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0653" source="CVE"/>
	<description>
	Integer overflow in X MultiMedia System (xmms) 1.2.10, and possibly other versions, allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which triggers memory corruption.
	</description>
 </metadata>
<!-- a9975f4c9780721d3c9f87a1e55dd600 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033358" comment="xmms-32bit less than 9-200704052111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031207" comment="xmms-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033359" comment="xmms-64bit less than 9-200704052313"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033360" comment="xmms-devel less than 1.2.10-44.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033361" comment="xmms-x86 less than 9-200704052140"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031208" comment="xmms less than 1.2.10-44.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0654</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0654" source="CVE"/>
	<description>
	Integer underflow in X MultiMedia System (xmms) 1.2.10 allows user-assisted remote attackers to execute arbitrary code via crafted header information in a skin bitmap image, which results in a stack-based buffer overflow.
	</description>
 </metadata>
<!-- a9975f4c9780721d3c9f87a1e55dd600 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033358" comment="xmms-32bit less than 9-200704052111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031207" comment="xmms-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033359" comment="xmms-64bit less than 9-200704052313"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033360" comment="xmms-devel less than 1.2.10-44.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033361" comment="xmms-x86 less than 9-200704052140"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031208" comment="xmms less than 1.2.10-44.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0720</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720" source="CVE"/>
	<description>
	The CUPS service on multiple platforms allows remote attackers to cause a denial of service (service hang) via a "partially-negotiated" SSL connection, which prevents other requests from being accepted.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 63f447c280c4a933229d8fa0dfe924a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031209" comment="cups-client less than 1.1.20-108.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031210" comment="cups-devel less than 1.1.20-108.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031211" comment="cups-libs-32bit less than 9-200704210224"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033362" comment="cups-libs-32bit less than 9-200704210455"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033363" comment="cups-libs-64bit less than 9-200704210347"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033364" comment="cups-libs-x86 less than 9-200704210410"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031212" comment="cups-libs less than 1.1.20-108.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031213" comment="cups less than 1.1.20-108.37"/>
		</criteria>
	</criteria>
	<!-- cc66bde9358590ba53f1c725ed4a4935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031214" comment="cups-client less than 1.1.20-108.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031215" comment="cups-devel less than 1.1.20-108.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031216" comment="cups-libs-32bit less than 9-200706090005"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033365" comment="cups-libs-64bit less than 9-200706090144"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033366" comment="cups-libs-x86 less than 9-200706082356"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031217" comment="cups-libs less than 1.1.20-108.39"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031218" comment="cups less than 1.1.20-108.39"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0775</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execute arbitrary code via certain vectors.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0776</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776" source="CVE"/>
	<description>
	Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0777</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0777" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0778</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0778" source="CVE"/>
	<description>
	The page cache feature in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 can generate hash collisions that cause page data to be appended to the wrong page cache, which allows remote attackers to obtain sensitive information or enable further attack vectors when the target page is reloaded from the cache.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0779</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0779" source="CVE"/>
	<description>
	GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0780</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0780" source="CVE"/>
	<description>
	browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0800</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0800" source="CVE"/>
	<description>
	Cross-zone vulnerability in Mozilla Firefox 1.5.0.9 considers blocked popups to have an internal zone origin, which allows user-assisted remote attackers to cross zone restrictions and read arbitrary file:// URIs by convincing a user to show a blocked popup.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0855</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0855" source="CVE"/>
	<description>
	Stack-based buffer overflow in RARLabs Unrar, as packaged in WinRAR and possibly other products, allows user-assisted remote attackers to execute arbitrary code via a crafted, password-protected archive.
	</description>
 </metadata>
<!-- 225dedd68b61946239752b49ae93f181 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031219" comment="unrar less than 3.3.6-28.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0897</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0897" source="CVE"/>
	<description>
	Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor.
	</description>
 </metadata>
<!-- abe28be29295a2d1e392e79ff39d4b40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033367" comment="clamav less than 0.90-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0898</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0898" source="CVE"/>
	<description>
	Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message.
	</description>
 </metadata>
<!-- abe28be29295a2d1e392e79ff39d4b40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033367" comment="clamav less than 0.90-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0906</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906" source="CVE"/>
	<description>
	Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions.  NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885).  NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).
	</description>
 </metadata>
<!-- 9331ab8ca1a0615674f5dd979bd4b413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033298" comment="apache-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033299" comment="apache2-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033300" comment="mod_php4-core less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033301" comment="mod_php4-servlet less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033302" comment="php4-devel less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033303" comment="php4-exif less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033304" comment="php4-fastcgi less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033305" comment="php4-imap less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033306" comment="php4-mhash less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033307" comment="php4-mysql less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033308" comment="php4-pear less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033309" comment="php4-session less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033310" comment="php4-sysvshm less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033311" comment="php4-unixODBC less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033312" comment="php4-wddx less than 4.3.4-43.75"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0907</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907" source="CVE"/>
	<description>
	Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function.
	</description>
 </metadata>
<!-- 9331ab8ca1a0615674f5dd979bd4b413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033298" comment="apache-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033299" comment="apache2-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033300" comment="mod_php4-core less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033301" comment="mod_php4-servlet less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033302" comment="php4-devel less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033303" comment="php4-exif less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033304" comment="php4-fastcgi less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033305" comment="php4-imap less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033306" comment="php4-mhash less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033307" comment="php4-mysql less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033308" comment="php4-pear less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033309" comment="php4-session less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033310" comment="php4-sysvshm less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033311" comment="php4-unixODBC less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033312" comment="php4-wddx less than 4.3.4-43.75"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0908</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908" source="CVE"/>
	<description>
	The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.
	</description>
 </metadata>
<!-- 9331ab8ca1a0615674f5dd979bd4b413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033298" comment="apache-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033299" comment="apache2-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033300" comment="mod_php4-core less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033301" comment="mod_php4-servlet less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033302" comment="php4-devel less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033303" comment="php4-exif less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033304" comment="php4-fastcgi less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033305" comment="php4-imap less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033306" comment="php4-mhash less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033307" comment="php4-mysql less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033308" comment="php4-pear less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033309" comment="php4-session less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033310" comment="php4-sysvshm less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033311" comment="php4-unixODBC less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033312" comment="php4-wddx less than 4.3.4-43.75"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0909</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.
	</description>
 </metadata>
<!-- 9331ab8ca1a0615674f5dd979bd4b413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033298" comment="apache-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033299" comment="apache2-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033300" comment="mod_php4-core less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033301" comment="mod_php4-servlet less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033302" comment="php4-devel less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033303" comment="php4-exif less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033304" comment="php4-fastcgi less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033305" comment="php4-imap less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033306" comment="php4-mhash less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033307" comment="php4-mysql less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033308" comment="php4-pear less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033309" comment="php4-session less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033310" comment="php4-sysvshm less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033311" comment="php4-unixODBC less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033312" comment="php4-wddx less than 4.3.4-43.75"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0910</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 5.2.1 allows attackers to "clobber" certain super-global variables via unspecified vectors.
	</description>
 </metadata>
<!-- 9331ab8ca1a0615674f5dd979bd4b413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033298" comment="apache-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033299" comment="apache2-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033300" comment="mod_php4-core less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033301" comment="mod_php4-servlet less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033302" comment="php4-devel less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033303" comment="php4-exif less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033304" comment="php4-fastcgi less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033305" comment="php4-imap less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033306" comment="php4-mhash less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033307" comment="php4-mysql less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033308" comment="php4-pear less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033309" comment="php4-session less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033310" comment="php4-sysvshm less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033311" comment="php4-unixODBC less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033312" comment="php4-wddx less than 4.3.4-43.75"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0911</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0911" source="CVE"/>
	<description>
	Off-by-one error in the str_ireplace function in PHP 5.2.1 might allow context-dependent attackers to cause a denial of service (crash).
	</description>
 </metadata>
<!-- 9331ab8ca1a0615674f5dd979bd4b413 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033298" comment="apache-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033299" comment="apache2-mod_php4 less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033300" comment="mod_php4-core less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033301" comment="mod_php4-servlet less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033302" comment="php4-devel less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033303" comment="php4-exif less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033304" comment="php4-fastcgi less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033305" comment="php4-imap less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033306" comment="php4-mhash less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033307" comment="php4-mysql less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033308" comment="php4-pear less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033309" comment="php4-session less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033310" comment="php4-sysvshm less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033311" comment="php4-unixODBC less than 4.3.4-43.75"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033312" comment="php4-wddx less than 4.3.4-43.75"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0981</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981" source="CVE"/>
	<description>
	Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0988</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0988" source="CVE"/>
	<description>
	The zend_hash_init function in PHP 5 before 5.2.1 and PHP 4 before 4.4.5, when running on a 64-bit platform, allows context-dependent attackers to cause a denial of service (infinite loop) by unserializing certain integer expressions, which only cause 32-bit arguments to be used after the check for a negative value, as demonstrated by an "a:2147483649:{" argument.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0995</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0995" source="CVE"/>
	<description>
	Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 ignores trailing invalid HTML characters in attribute names, which allows remote attackers to bypass content filters that use regular expressions.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0996</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0996" source="CVE"/>
	<description>
	The child frames in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 inherit the default charset from the parent window, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated using the UTF-7 character set.
	</description>
 </metadata>
<!-- adf5cccb9b0cfb2f9cb649652f793fdc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033297" comment="mozilla-calendar less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031024" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031025" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031026" comment="mozilla-devel less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031027" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031028" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031029" comment="mozilla-irc less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031031" comment="mozilla-mail less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031032" comment="mozilla-venkman less than 1.8_seamonkey_1.0.8-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031033" comment="mozilla less than 1.8_seamonkey_1.0.8-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1001</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1001" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1003</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1003" source="CVE"/>
	<description>
	Integer overflow in ALLOCATE_LOCAL in the ProcXCMiscGetXIDList function in the XC-MISC extension in the X.Org X11 server (xserver) 7.1-1.1.0, and other versions before 20070403, allows remote authenticated users to execute arbitrary code via a large expression, which results in memory corruption.
	</description>
 </metadata>
<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033415" comment="XFree86-libs-32bit less than 9-200704052111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033416" comment="XFree86-libs-64bit less than 9-200704052313"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033417" comment="XFree86-libs-x86 less than 9-200704052140"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1095</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1095" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 do not properly implement JavaScript onUnload handlers, which allows remote attackers to run certain JavaScript code and access the location DOM hierarchy in the context of the next web site that is visited by a client.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1263</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1263" source="CVE"/>
	<description>
	GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.
	</description>
 </metadata>
<!-- 3fafef103902137d0bea93863e650bdb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031230" comment="gpg less than 1.2.4-68.25"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1285</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1285" source="CVE"/>
	<description>
	The Zend Engine in PHP 4.x before 4.4.7, and 5.x before 5.2.2, allows remote attackers to cause a denial of service (stack exhaustion and PHP crash) via deeply nested arrays, which trigger deep recursion in the variable destruction routines.
	</description>
 </metadata>
<!-- 34e44a394ab66fcf29b156158bf01627 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033418" comment="apache-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033419" comment="apache2-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033420" comment="mod_php4-apache2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033421" comment="mod_php4-core less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033422" comment="mod_php4-servlet less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033423" comment="php4-bcmath less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033424" comment="php4-bz2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033425" comment="php4-calendar less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033426" comment="php4-ctype less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033427" comment="php4-curl less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033428" comment="php4-dba less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033429" comment="php4-dbase less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033430" comment="php4-devel less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033431" comment="php4-domxml less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033432" comment="php4-exif less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033433" comment="php4-fastcgi less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033434" comment="php4-filepro less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033435" comment="php4-ftp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033436" comment="php4-gd less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033437" comment="php4-gettext less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033438" comment="php4-gmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033439" comment="php4-iconv less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033440" comment="php4-imap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033441" comment="php4-ldap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033442" comment="php4-mbstring less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033443" comment="php4-mcal less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033444" comment="php4-mcrypt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033445" comment="php4-mhash less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033446" comment="php4-mime_magic less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033447" comment="php4-mysql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033448" comment="php4-pear less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033449" comment="php4-pgsql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033450" comment="php4-qtdom less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033451" comment="php4-readline less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033452" comment="php4-recode less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033453" comment="php4-session less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033454" comment="php4-shmop less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033455" comment="php4-snmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033456" comment="php4-sockets less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033457" comment="php4-swf less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033458" comment="php4-sysvsem less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033459" comment="php4-sysvshm less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033460" comment="php4-unixODBC less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033461" comment="php4-wddx less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033462" comment="php4-xslt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033463" comment="php4-yp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033464" comment="php4-zlib less than 4.3.4-43.79"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1349</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349" source="CVE"/>
	<description>
	PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
	</description>
 </metadata>
<!-- 970ad9ec3edc9ba45c1d8846f02e9d02 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033465" comment="mod_perl less than 1.29-36.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1351</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1351" source="CVE"/>
	<description>
	Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2.3.2 and earlier allows remote authenticated users to execute arbitrary code via crafted BDF fonts, which result in a heap overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8ca868775a8fa10efec1413e9ba8d2d1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033466" comment="freetype2-32bit less than 9-200704052111"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031231" comment="freetype2-32bit less than 9-200704052143"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033467" comment="freetype2-64bit less than 9-200704052313"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033468" comment="freetype2-devel-32bit less than 9-200704052111"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031232" comment="freetype2-devel-32bit less than 9-200704052143"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033469" comment="freetype2-devel-64bit less than 9-200704052313"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031233" comment="freetype2-devel less than 2.1.7-53.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033470" comment="freetype2-x86 less than 9-200704052140"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031234" comment="freetype2 less than 2.1.7-53.15"/>
		</criteria>
	</criteria>
	<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033415" comment="XFree86-libs-32bit less than 9-200704052111"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033416" comment="XFree86-libs-64bit less than 9-200704052313"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033417" comment="XFree86-libs-x86 less than 9-200704052140"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1352</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1352" source="CVE"/>
	<description>
	Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
	</description>
 </metadata>
<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033415" comment="XFree86-libs-32bit less than 9-200704052111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033416" comment="XFree86-libs-64bit less than 9-200704052313"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033417" comment="XFree86-libs-x86 less than 9-200704052140"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1353</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1353" source="CVE"/>
	<description>
	The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1357</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1357" source="CVE"/>
	<description>
	The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1358</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
	</description>
 </metadata>
<!-- 2495ca9e3f4d48cf82846e7b51f4da79 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033011" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033012" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033013" comment="jakarta-tomcat-doc less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033014" comment="jakarta-tomcat-examples less than 5.0.19-29.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030716" comment="jakarta-tomcat less than 5.0.19-29.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1362</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1362" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to cause a denial of service via (1) a large cookie path parameter, which triggers memory consumption, or (2) an internal delimiter within cookie path or name values, which could trigger a misinterpretation of cookie data, aka "Path Abuse in Cookies."
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1375</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1375" source="CVE"/>
	<description>
	Integer overflow in the substr_compare function in PHP 5.2.1 and earlier allows context-dependent attackers to read sensitive memory via a large value in the length argument, a different vulnerability than CVE-2006-1991.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1376</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1376" source="CVE"/>
	<description>
	The shmop functions in PHP before 4.4.5, and before 5.2.1 in the 5.x series, do not verify that their arguments correspond to a shmop resource, which allows context-dependent attackers to read and write arbitrary memory locations via arguments associated with an inappropriate resource, as demonstrated by a GD Image resource.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1380</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1380" source="CVE"/>
	<description>
	The php_binary serialization handler in the session extension in PHP before 4.4.5, and 5.x before 5.2.1, allows context-dependent attackers to obtain sensitive information (memory contents) via a serialized variable entry with a large length value, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1383</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1383" source="CVE"/>
	<description>
	Integer overflow in the 16 bit variable reference counter in PHP 4 allows context-dependent attackers to execute arbitrary code by overflowing this counter, which causes the same variable to be destroyed twice, a related issue to CVE-2007-1286.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1396</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1396" source="CVE"/>
	<description>
	The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact.  NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.
	</description>
 </metadata>
<!-- 34e44a394ab66fcf29b156158bf01627 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033418" comment="apache-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033419" comment="apache2-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033420" comment="mod_php4-apache2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033421" comment="mod_php4-core less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033422" comment="mod_php4-servlet less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033423" comment="php4-bcmath less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033424" comment="php4-bz2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033425" comment="php4-calendar less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033426" comment="php4-ctype less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033427" comment="php4-curl less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033428" comment="php4-dba less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033429" comment="php4-dbase less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033430" comment="php4-devel less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033431" comment="php4-domxml less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033432" comment="php4-exif less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033433" comment="php4-fastcgi less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033434" comment="php4-filepro less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033435" comment="php4-ftp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033436" comment="php4-gd less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033437" comment="php4-gettext less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033438" comment="php4-gmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033439" comment="php4-iconv less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033440" comment="php4-imap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033441" comment="php4-ldap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033442" comment="php4-mbstring less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033443" comment="php4-mcal less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033444" comment="php4-mcrypt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033445" comment="php4-mhash less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033446" comment="php4-mime_magic less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033447" comment="php4-mysql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033448" comment="php4-pear less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033449" comment="php4-pgsql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033450" comment="php4-qtdom less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033451" comment="php4-readline less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033452" comment="php4-recode less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033453" comment="php4-session less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033454" comment="php4-shmop less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033455" comment="php4-snmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033456" comment="php4-sockets less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033457" comment="php4-swf less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033458" comment="php4-sysvsem less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033459" comment="php4-sysvshm less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033460" comment="php4-unixODBC less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033461" comment="php4-wddx less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033462" comment="php4-xslt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033463" comment="php4-yp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033464" comment="php4-zlib less than 4.3.4-43.79"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1461</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1461" source="CVE"/>
	<description>
	The compress.bzip2:// URL wrapper provided by the bz2 extension in PHP before 4.4.7, and 5.x before 5.2.2, does not implement safemode or open_basedir checks, which allows remote attackers to read bzip2 archives located outside of the intended directories.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1473</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1473" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in framework/NLS/NLS.php in Horde Framework before 3.1.4 RC1, when the login page contains a language selection box, allows remote attackers to inject arbitrary web script or HTML via the new_lang parameter to login.php.
	</description>
 </metadata>
<!-- 90d876345fe2c2a1da8ae08a0a73db58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033472" comment="horde less than 2.2.5-63.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1484</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1484" source="CVE"/>
	<description>
	The array_user_key_compare function in PHP 4.4.6 and earlier, and 5.x up to 5.2.1, makes erroneous calls to zval_dtor, which triggers memory corruption and allows local users to bypass safe_mode and execute arbitrary code via a certain unset operation after array_user_key_compare has been called.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1521</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1521" source="CVE"/>
	<description>
	Double free vulnerability in PHP before 4.4.7, and 5.x before 5.2.2, allows context-dependent attackers to execute arbitrary code by interrupting the session_regenerate_id function, as demonstrated by calling a userspace error handler or triggering a memory limit violation.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1536</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1536" source="CVE"/>
	<description>
	Integer underflow in the file_printf function in the "file" program before 4.20 allows user-assisted attackers to execute arbitrary code via a file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 730935e4cb22680a9cd6d34f81857e20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033473" comment="file-32bit less than 9-200703261518"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031247" comment="file-32bit less than 9-200703261521"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033474" comment="file-64bit less than 9-200703261528"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033475" comment="file-x86 less than 9-200703261519"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031248" comment="file less than 4.09-3.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1558</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1558" source="CVE"/>
	<description>
	The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) attacks that use crafted message IDs and MD5 collisions.  NOTE: this design-level issue potentially affects all products that use APOP, including (1) Thunderbird 1.x before 1.5.0.12 and 2.x before 2.0.0.4, (2) Evolution, (3) mutt, (4) fetchmail before 6.3.8, (5) SeaMonkey 1.0.x before 1.0.9 and 1.1.x before 1.1.2, (6) Balsa 2.3.16 and earlier, (7) Mailfilter before 0.8.2, and possibly other products.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1562</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1562" source="CVE"/>
	<description>
	The FTP protocol implementation in Mozilla Firefox before 1.5.0.11 and 2.x before 2.0.0.3 allows remote attackers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1564</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1564" source="CVE"/>
	<description>
	The FTP protocol implementation in Konqueror 3.5.5 allows remote servers to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in an FTP PASV response.
	</description>
 </metadata>
<!-- bf7f3f26a29a4c24de3b8f0e3e664432 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033352" comment="kdelibs3-32bit less than 9-200704031603"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031196" comment="kdelibs3-32bit less than 9-200704031835"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033353" comment="kdelibs3-64bit less than 9-200704031815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031197" comment="kdelibs3-devel less than 3.2.1-44.69"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033354" comment="kdelibs3-x86 less than 9-200704031929"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031198" comment="kdelibs3 less than 3.2.1-44.69"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1583</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1583" source="CVE"/>
	<description>
	The mb_parse_str function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 sets the internal register_globals flag and does not disable it in certain cases when a script terminates, which allows remote attackers to invoke available PHP scripts with register_globals functionality that is not detectable by these scripts, as demonstrated by forcing a memory_limit violation.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1592</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1592" source="CVE"/>
	<description>
	net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6 socket, attaching a flow label, and connecting to that socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 063186d609d0c000d82de658ffc6d8a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033164" comment="kernel-s390 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 5e5a3ef7688beb8187d2d8d392ffa6d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033165" comment="kernel-64k-pagesize less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033167" comment="kernel-sn2 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 673f6083e9439e61c7fa2f180c34536e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 91a8c8123bccff3f998907b145c6793f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030858" comment="kernel-bigsmp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033166" comment="kernel-debug less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033168" comment="kernel-um less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033169" comment="um-host-install-initrd less than 1.0-48.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033170" comment="um-host-kernel less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- 9aa2f38a7ff6f7a53b954242d5064342 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033171" comment="kernel-s390x less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
	<!-- e6f02c96ab1cd79ccc9bcb9bff4cde44 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030854" comment="kernel-default less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033172" comment="kernel-iseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033173" comment="kernel-pmac64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033174" comment="kernel-pseries64 less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030855" comment="kernel-smp less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030856" comment="kernel-source less than 2.6.5-7.286"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030857" comment="kernel-syms less than 2.6.5-7.286"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1659</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.3 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via regex patterns containing unmatched "\Q\E" sequences with orphan "\E" codes.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 73795549f9a608bace82f0cf345b3a42 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033326" comment="pcre-32bit less than 9-200711270033"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031098" comment="pcre-32bit less than 9-200711270035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033327" comment="pcre-64bit less than 9-200711270034"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031099" comment="pcre-devel less than 4.4-109.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033328" comment="pcre-x86 less than 9-200711270035"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031100" comment="pcre less than 4.4-109.12"/>
		</criteria>
	</criteria>
	<!-- 9992478cea3704f6f2c2f7741f3e12e2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031101" comment="pcre-32bit less than 9-200711192343"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033329" comment="pcre-32bit less than 9-200711192344"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033330" comment="pcre-64bit less than 9-200711192338"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031102" comment="pcre-devel less than 4.4-109.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033331" comment="pcre-x86 less than 9-200711192343"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031103" comment="pcre less than 4.4-109.10"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1660</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660" source="CVE"/>
	<description>
	Perl-Compatible Regular Expression (PCRE) library before 7.0 does not properly calculate sizes for unspecified "multiple forms of character class", which triggers a buffer overflow that allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02ba535f3b526c99b9b5525f2fcfac3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031045" comment="pcre-32bit less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033317" comment="pcre-32bit less than 9-200711150230"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033318" comment="pcre-64bit less than 9-200711150231"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031046" comment="pcre-devel less than 4.4-109.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033319" comment="pcre-x86 less than 9-200711150229"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031047" comment="pcre less than 4.4-109.8"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
	<!-- f3cf1435d12b7ef88a846de203195e0c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031094" comment="apache2-devel less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033324" comment="apache2-doc less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033325" comment="apache2-example-pages less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031095" comment="apache2-prefork less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031096" comment="apache2-worker less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031097" comment="apache2 less than 2.0.59-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031093" comment="libapr0 less than 2.0.59-1.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1667</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667" source="CVE"/>
	<description>
	Multiple integer overflows in (1) the XGetPixel function in ImUtil.c in X.Org libx11 before 1.0.3, and (2) XInitImage function in xwd.c for ImageMagick, allow user-assisted remote attackers to cause a denial of service (crash) or obtain sensitive information via crafted images with large or negative values that trigger a buffer overflow.
	</description>
 </metadata>
<!-- d02caf41ef1474e8a88dc11ae5b1e0ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031220" comment="XFree86-Xnest less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031221" comment="XFree86-Xprt less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031222" comment="XFree86-Xvfb less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031223" comment="XFree86-Xvnc less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033415" comment="XFree86-libs-32bit less than 9-200704052111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031224" comment="XFree86-libs-32bit less than 9-200704052143"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033416" comment="XFree86-libs-64bit less than 9-200704052313"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033417" comment="XFree86-libs-x86 less than 9-200704052140"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031225" comment="XFree86-libs less than 4.3.99.902-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031226" comment="XFree86-server less than 4.3.99.902-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1700</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1700" source="CVE"/>
	<description>
	The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1717</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1717" source="CVE"/>
	<description>
	The mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 truncates e-mail messages at the first ASCIIZ ('\0') byte, which might allow context-dependent attackers to prevent intended information from being delivered in e-mail messages.  NOTE: this issue might be security-relevant in cases when the trailing contents of e-mail messages are important, such as logging information or if the message is expected to be well-formed.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1718</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1718" source="CVE"/>
	<description>
	CRLF injection vulnerability in the mail function in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allows remote attackers to inject arbitrary e-mail headers and possibly conduct spam attacks via a control character immediately following folding of the (1) Subject or (2) To parameter, as demonstrated by a parameter containing a "\r\n\t\n" sequence, related to an increment bug in the SKIP_LONG_HEADER_SEP macro.
	</description>
 </metadata>
<!-- c3551a01d5cfd4b788ec2ae2833cf2e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033368" comment="apache-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033369" comment="apache2-mod_php4 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033370" comment="mod_php4-apache2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033371" comment="mod_php4-core less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033372" comment="mod_php4-servlet less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033373" comment="php4-bcmath less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033374" comment="php4-bz2 less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033375" comment="php4-calendar less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033376" comment="php4-ctype less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033377" comment="php4-curl less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033378" comment="php4-dba less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033379" comment="php4-dbase less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033380" comment="php4-devel less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033381" comment="php4-domxml less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033382" comment="php4-exif less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033383" comment="php4-fastcgi less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033384" comment="php4-filepro less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033385" comment="php4-ftp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033386" comment="php4-gd less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033387" comment="php4-gettext less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033388" comment="php4-gmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033389" comment="php4-iconv less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033390" comment="php4-imap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033391" comment="php4-ldap less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033392" comment="php4-mbstring less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033393" comment="php4-mcal less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033394" comment="php4-mcrypt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033395" comment="php4-mhash less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033396" comment="php4-mime_magic less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033397" comment="php4-mysql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033398" comment="php4-pear less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033399" comment="php4-pgsql less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033400" comment="php4-qtdom less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033401" comment="php4-readline less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033402" comment="php4-recode less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033403" comment="php4-session less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033404" comment="php4-shmop less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033405" comment="php4-snmp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033406" comment="php4-sockets less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033407" comment="php4-swf less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033408" comment="php4-sysvsem less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033409" comment="php4-sysvshm less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033410" comment="php4-unixODBC less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033411" comment="php4-wddx less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033412" comment="php4-xslt less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033413" comment="php4-yp less than 4.3.4-43.77"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033414" comment="php4-zlib less than 4.3.4-43.77"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1745</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1745" source="CVE"/>
	<description>
	The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 50a5cb718f20761dd7e0b6b4e0935c52 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033476" comment="clamav less than 0.90.2-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1841</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1841" source="CVE"/>
	<description>
	The isakmp_info_recv function in src/racoon/isakmp_inf.c in racoon in Ipsec-tools before 0.6.7 allows remote attackers to cause a denial of service (tunnel crash) via crafted (1) DELETE (ISAKMP_NPTYPE_D) and (2) NOTIFY (ISAKMP_NPTYPE_N) messages.
	</description>
 </metadata>
<!-- 888cafa59377f07fba0b7773bc65da92 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031251" comment="ipsec-tools less than 0.3.3-1.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1858</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1858" source="CVE"/>
	<description>
	The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0.0 through 5.0.30, and 5.5.0 through 5.5.17 uses certain insecure ciphers, including the anonymous cipher, which allows remote attackers to obtain sensitive information or have other, unspecified impacts.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033477" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033478" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033479" comment="jakarta-tomcat-doc less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033480" comment="jakarta-tomcat-examples less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1859</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1859" source="CVE"/>
	<description>
	XScreenSaver 4.10, when using a remote directory service for credentials, does not properly handle the results from the getpwuid function in drivers/lock.c when there is no network connectivity, which causes XScreenSaver to crash and unlock the screen and allows local users to bypass authentication.
	</description>
 </metadata>
<!-- 79a3eeb2e0ca986fd0c5d61d1d917f67 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031253" comment="xscreensaver less than 4.16-2.28"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1860</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1860" source="CVE"/>
	<description>
	mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032896" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032897" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032898" comment="jakarta-tomcat-doc less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032899" comment="jakarta-tomcat-examples less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1863</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863" source="CVE"/>
	<description>
	cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033290" comment="apache2-doc less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033291" comment="apache2-example-pages less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1864</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1864" source="CVE"/>
	<description>
	Buffer overflow in the bundled libxmlrpc library in PHP before 4.4.7, and 5.x before 5.2.2, has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 34e44a394ab66fcf29b156158bf01627 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033418" comment="apache-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033419" comment="apache2-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033420" comment="mod_php4-apache2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033421" comment="mod_php4-core less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033422" comment="mod_php4-servlet less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033423" comment="php4-bcmath less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033424" comment="php4-bz2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033425" comment="php4-calendar less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033426" comment="php4-ctype less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033427" comment="php4-curl less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033428" comment="php4-dba less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033429" comment="php4-dbase less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033430" comment="php4-devel less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033431" comment="php4-domxml less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033432" comment="php4-exif less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033433" comment="php4-fastcgi less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033434" comment="php4-filepro less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033435" comment="php4-ftp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033436" comment="php4-gd less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033437" comment="php4-gettext less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033438" comment="php4-gmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033439" comment="php4-iconv less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033440" comment="php4-imap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033441" comment="php4-ldap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033442" comment="php4-mbstring less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033443" comment="php4-mcal less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033444" comment="php4-mcrypt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033445" comment="php4-mhash less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033446" comment="php4-mime_magic less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033447" comment="php4-mysql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033448" comment="php4-pear less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033449" comment="php4-pgsql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033450" comment="php4-qtdom less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033451" comment="php4-readline less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033452" comment="php4-recode less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033453" comment="php4-session less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033454" comment="php4-shmop less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033455" comment="php4-snmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033456" comment="php4-sockets less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033457" comment="php4-swf less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033458" comment="php4-sysvsem less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033459" comment="php4-sysvshm less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033460" comment="php4-unixODBC less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033461" comment="php4-wddx less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033462" comment="php4-xslt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033463" comment="php4-yp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033464" comment="php4-zlib less than 4.3.4-43.79"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1995</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1995" source="CVE"/>
	<description>
	bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read.
	</description>
 </metadata>
<!-- bb77019823321963e43a0e111a0ef139 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033481" comment="quagga less than 0.96.4-31.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1997</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1997" source="CVE"/>
	<description>
	Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.
	</description>
 </metadata>
<!-- 50a5cb718f20761dd7e0b6b4e0935c52 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033476" comment="clamav less than 0.90.2-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2022</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022" source="CVE"/>
	<description>
	Adobe Macromedia Flash Player 7 and 9, when used with Opera before 9.20 or Konqueror before 20070613, allows remote attackers to obtain sensitive information (browser keystrokes), which are leaked to the Flash Player applet.
	</description>
 </metadata>
<!-- a329d00d1ffda74b527ad3f526ff8e62 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031255" comment="kdebase3-32bit less than 9-200705221253"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033482" comment="kdebase3-32bit less than 9-200705221349"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033483" comment="kdebase3-64bit less than 9-200705221229"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033484" comment="kdebase3-x86 less than 9-200705221242"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031256" comment="kdebase3 less than 3.2.1-68.59"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2028</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2028" source="CVE"/>
	<description>
	Memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.
	</description>
 </metadata>
<!-- 8bff9b191dc9902af9e20537c2fbaeea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033485" comment="freeradius-devel less than 1.0.5-2.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033486" comment="freeradius less than 1.0.5-2.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2052</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2052" source="CVE"/>
	<description>
	Off-by-one error in the PyLocale_strxfrm function in Modules/_localemodule.c for Python 2.4 and 2.5 causes an incorrect buffer size to be used for the strxfrm function, which allows context-dependent attackers to read portions of memory via unknown manipulations that trigger a buffer over-read due to missing null termination.
	</description>
 </metadata>
<!-- 74ea95d7621db0dbcf832e3be84300de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033487" comment="python-32bit less than 9-200705252036"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031257" comment="python-32bit less than 9-200705260110"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033488" comment="python-64bit less than 9-200705252330"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031258" comment="python-devel less than 2.3.3-88.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033489" comment="python-x86 less than 9-200705260247"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031259" comment="python less than 2.3.3-88.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2292</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2292" source="CVE"/>
	<description>
	CRLF injection vulnerability in the Digest Authentication support for Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allows remote attackers to conduct HTTP request splitting attacks via LF (%0a) bytes in the username attribute.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2445</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2445" source="CVE"/>
	<description>
	The png_handle_tRNS function in pngrutil.c in libpng before 1.0.25 and 1.2.x before 1.2.17 allows remote attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value.
	</description>
 </metadata>
<!-- 46bf07db17204012a69d1c67caf92ee4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033490" comment="libpng-32bit less than 9-200705252036"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031261" comment="libpng-32bit less than 9-200705260110"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033491" comment="libpng-64bit less than 9-200705252330"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031262" comment="libpng-devel less than 1.2.5-182.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033492" comment="libpng-x86 less than 9-200705260247"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031263" comment="libpng less than 1.2.5-182.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2446</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2446" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the NDR parsing in smbd in Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d), (2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount (lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2 (lsa_io_trans_names).
	</description>
 </metadata>
<!-- d2956ba1a85d7a27cc6a91e7693a737c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033493" comment="libsmbclient-32bit less than 9-200705181232"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031264" comment="libsmbclient-32bit less than 9-200705181249"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033494" comment="libsmbclient-64bit less than 9-200705181242"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031265" comment="libsmbclient-devel less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031266" comment="libsmbclient less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031267" comment="samba-client less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031268" comment="samba-doc less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031269" comment="samba-pdb less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031270" comment="samba-python less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031271" comment="samba-vscan less than 0.3.6b-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031272" comment="samba-winbind less than 3.0.20b-3.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031273" comment="samba less than 3.0.20b-3.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2447</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2447" source="CVE"/>
	<description>
	The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 030f92e97ede6166fdaf8c9603ef87be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033495" comment="libsmbclient-32bit less than 9-200706251715"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031275" comment="libsmbclient-32bit less than 9-200706251737"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033496" comment="libsmbclient-64bit less than 9-200706251754"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031276" comment="libsmbclient-devel less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031277" comment="libsmbclient less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031278" comment="samba-client less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031279" comment="samba-doc less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031280" comment="samba-pdb less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031281" comment="samba-python less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031282" comment="samba-vscan less than 0.3.6b-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031283" comment="samba-winbind less than 3.0.20b-3.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031284" comment="samba less than 3.0.20b-3.21"/>
		</criteria>
	</criteria>
	<!-- d2956ba1a85d7a27cc6a91e7693a737c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033493" comment="libsmbclient-32bit less than 9-200705181232"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031264" comment="libsmbclient-32bit less than 9-200705181249"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033494" comment="libsmbclient-64bit less than 9-200705181242"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031265" comment="libsmbclient-devel less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031266" comment="libsmbclient less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031267" comment="samba-client less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031268" comment="samba-doc less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031269" comment="samba-pdb less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031270" comment="samba-python less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031271" comment="samba-vscan less than 0.3.6b-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031272" comment="samba-winbind less than 3.0.20b-3.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031273" comment="samba less than 3.0.20b-3.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2449</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2449" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI after the ';' character, as demonstrated by a URI containing a "snp/snoop.jsp;" sequence.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033477" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033478" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033479" comment="jakarta-tomcat-doc less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033480" comment="jakarta-tomcat-examples less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2450</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2450" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033477" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033478" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033479" comment="jakarta-tomcat-doc less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033480" comment="jakarta-tomcat-examples less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2509</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2509" source="CVE"/>
	<description>
	CRLF injection vulnerability in the ftp_putcmd function in PHP before 4.4.7, and 5.x before 5.2.2 allows remote attackers to inject arbitrary FTP commands via CRLF sequences in the parameters to earlier FTP commands.
	</description>
 </metadata>
<!-- 34e44a394ab66fcf29b156158bf01627 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033418" comment="apache-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033419" comment="apache2-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033420" comment="mod_php4-apache2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033421" comment="mod_php4-core less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033422" comment="mod_php4-servlet less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033423" comment="php4-bcmath less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033424" comment="php4-bz2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033425" comment="php4-calendar less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033426" comment="php4-ctype less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033427" comment="php4-curl less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033428" comment="php4-dba less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033429" comment="php4-dbase less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033430" comment="php4-devel less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033431" comment="php4-domxml less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033432" comment="php4-exif less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033433" comment="php4-fastcgi less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033434" comment="php4-filepro less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033435" comment="php4-ftp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033436" comment="php4-gd less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033437" comment="php4-gettext less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033438" comment="php4-gmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033439" comment="php4-iconv less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033440" comment="php4-imap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033441" comment="php4-ldap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033442" comment="php4-mbstring less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033443" comment="php4-mcal less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033444" comment="php4-mcrypt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033445" comment="php4-mhash less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033446" comment="php4-mime_magic less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033447" comment="php4-mysql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033448" comment="php4-pear less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033449" comment="php4-pgsql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033450" comment="php4-qtdom less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033451" comment="php4-readline less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033452" comment="php4-recode less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033453" comment="php4-session less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033454" comment="php4-shmop less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033455" comment="php4-snmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033456" comment="php4-sockets less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033457" comment="php4-swf less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033458" comment="php4-sysvsem less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033459" comment="php4-sysvshm less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033460" comment="php4-unixODBC less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033461" comment="php4-wddx less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033462" comment="php4-xslt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033463" comment="php4-yp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033464" comment="php4-zlib less than 4.3.4-43.79"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2525</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2525" source="CVE"/>
	<description>
	Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04a995573698ff4214863690f5aeba5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033497" comment="kernel-64k-pagesize less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033499" comment="kernel-sn2 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 1c8f3645ba3d5dbc64e0896cf7c55997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033500" comment="kernel-s390x-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033501" comment="kernel-s390x less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 79ad90eebcf05ad4304479c0d22b0b96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 7e7048f8f7ffd90614b0e72e6fbe6a95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 977651f223935a83c8e78063a5d4a199 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033505" comment="kernel-s390-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033506" comment="kernel-s390 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- db175614c512157df22f534c459eec62 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033507" comment="kernel-iseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033508" comment="kernel-pmac64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033509" comment="kernel-pseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2583</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2583" source="CVE"/>
	<description>
	The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2645</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2645" source="CVE"/>
	<description>
	Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable.
	</description>
 </metadata>
<!-- d2186e8218d131e17a5524c43a27b841 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031297" comment="libexif less than 0.5.12-118.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2650</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2650" source="CVE"/>
	<description>
	The OLE2 parser in Clam AntiVirus (ClamAV) allows remote attackers to cause a denial of service (resource consumption) via an OLE2 file with (1) a large property size or (2) a loop in the FAT file block chain that triggers an infinite loop, as demonstrated via a crafted DOC file.
	</description>
 </metadata>
<!-- 5a3e85703885a03d41664f02c24200e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2654</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2654" source="CVE"/>
	<description>
	xfs_fsr in xfsdump creates a .fsr temporary directory with insecure permissions, which allows local users to read or overwrite arbitrary files on xfs filesystems.
	</description>
 </metadata>
<!-- b78e89dbf7667b5a3b5c860694ddbd85 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031298" comment="xfsdump less than 2.2.25-0.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2691</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2691" source="CVE"/>
	<description>
	MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2692</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2692" source="CVE"/>
	<description>
	The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2727</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2727" source="CVE"/>
	<description>
	The mcrypt_create_iv function in ext/mcrypt/mcrypt.c in PHP before 4.4.7, 5.2.1, and possibly 5.0.x and other PHP 5 versions, calls php_rand_r with an uninitialized seed variable and therefore always generates the same initialization vector (IV), which might allow context-dependent attackers to decrypt certain data more easily because of the guessable encryption keys.
	</description>
 </metadata>
<!-- b1c0b8d3ce8da450fbeea2ef4bac63c3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033511" comment="apache-mod_php4 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033512" comment="apache2-mod_php4 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033513" comment="mod_php4-apache2 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033514" comment="mod_php4-core less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033515" comment="mod_php4-servlet less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033516" comment="php4-bcmath less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033517" comment="php4-bz2 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033518" comment="php4-calendar less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033519" comment="php4-ctype less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033520" comment="php4-curl less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033521" comment="php4-dba less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033522" comment="php4-dbase less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033523" comment="php4-devel less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033524" comment="php4-domxml less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033525" comment="php4-exif less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033526" comment="php4-fastcgi less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033527" comment="php4-filepro less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033528" comment="php4-ftp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033529" comment="php4-gd less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033530" comment="php4-gettext less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033531" comment="php4-gmp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033532" comment="php4-iconv less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033533" comment="php4-imap less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033534" comment="php4-ldap less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033535" comment="php4-mbstring less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033536" comment="php4-mcal less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033537" comment="php4-mcrypt less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033538" comment="php4-mhash less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033539" comment="php4-mime_magic less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033540" comment="php4-mysql less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033541" comment="php4-pear less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033542" comment="php4-pgsql less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033543" comment="php4-qtdom less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033544" comment="php4-readline less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033545" comment="php4-recode less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033546" comment="php4-session less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033547" comment="php4-shmop less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033548" comment="php4-snmp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033549" comment="php4-sockets less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033550" comment="php4-swf less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033551" comment="php4-sysvsem less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033552" comment="php4-sysvshm less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033553" comment="php4-unixODBC less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033554" comment="php4-wddx less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033555" comment="php4-xslt less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033556" comment="php4-yp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033557" comment="php4-zlib less than 4.3.4-43.82"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2741</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2741" source="CVE"/>
	<description>
	Stack-based buffer overflow in Little CMS (lcms) before 1.15 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted ICC profile in a JPG file.
	</description>
 </metadata>
<!-- 8ecfa3a9060b31eeb24652f5e49ba619 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031299" comment="liblcms-32bit less than 9-200711060115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033558" comment="liblcms-64bit less than 9-200711060517"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031300" comment="liblcms-devel less than 1.12-55.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033559" comment="liblcms-x86 less than 9-200711060115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031301" comment="liblcms less than 1.12-55.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2754</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754" source="CVE"/>
	<description>
	Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arbitrary code via a crafted TTF image with a negative n_points value, which leads to an integer overflow and heap-based buffer overflow.
	</description>
 </metadata>
<!-- 21c9a243dbedc0b6b97f4bf9e8e2d3f9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033560" comment="freetype2-32bit less than 9-200706160241"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031302" comment="freetype2-32bit less than 9-200706182342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033561" comment="freetype2-64bit less than 9-200706161829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033562" comment="freetype2-devel-32bit less than 9-200706160241"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031303" comment="freetype2-devel-32bit less than 9-200706182342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033563" comment="freetype2-devel-64bit less than 9-200706161829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031304" comment="freetype2-devel less than 2.1.7-53.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033564" comment="freetype2-x86 less than 9-200706182333"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031305" comment="freetype2 less than 2.1.7-53.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2756</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2756" source="CVE"/>
	<description>
	The gdPngReadData function in libgd 2.0.34 allows user-assisted attackers to cause a denial of service (CPU consumption) via a crafted PNG image with truncated data, which causes an infinite loop in the png_read_info function in libpng.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 33021a1f5a7b0f68ed168c1378788258 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033565" comment="gd-devel less than 2.0.22-65.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033566" comment="gd less than 2.0.22-65.12"/>
		</criteria>
	</criteria>
	<!-- 34e44a394ab66fcf29b156158bf01627 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033418" comment="apache-mod_php4 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033419" comment="apache2-mod_php4 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033420" comment="mod_php4-apache2 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033421" comment="mod_php4-core less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033422" comment="mod_php4-servlet less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033423" comment="php4-bcmath less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033424" comment="php4-bz2 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033425" comment="php4-calendar less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033426" comment="php4-ctype less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033427" comment="php4-curl less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033428" comment="php4-dba less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033429" comment="php4-dbase less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033430" comment="php4-devel less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033431" comment="php4-domxml less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033432" comment="php4-exif less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033433" comment="php4-fastcgi less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033434" comment="php4-filepro less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033435" comment="php4-ftp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033436" comment="php4-gd less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033437" comment="php4-gettext less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033438" comment="php4-gmp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033439" comment="php4-iconv less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033440" comment="php4-imap less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033441" comment="php4-ldap less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033442" comment="php4-mbstring less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033443" comment="php4-mcal less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033444" comment="php4-mcrypt less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033445" comment="php4-mhash less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033446" comment="php4-mime_magic less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033447" comment="php4-mysql less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033448" comment="php4-pear less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033449" comment="php4-pgsql less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033450" comment="php4-qtdom less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033451" comment="php4-readline less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033452" comment="php4-recode less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033453" comment="php4-session less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033454" comment="php4-shmop less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033455" comment="php4-snmp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033456" comment="php4-sockets less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033457" comment="php4-swf less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033458" comment="php4-sysvsem less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033459" comment="php4-sysvshm less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033460" comment="php4-unixODBC less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033461" comment="php4-wddx less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033462" comment="php4-xslt less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033463" comment="php4-yp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033464" comment="php4-zlib less than 4.3.4-43.79"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2788</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2788" source="CVE"/>
	<description>
	Integer overflow in the embedded ICC profile image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_20 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (JVM crash) via a crafted JPEG or BMP file that triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1d3d4cc05bdfc425f875a1d8a7ef9b7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033567" comment="IBMJava2-JRE less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033568" comment="IBMJava2-JRE less than 1.4.2-0.92.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033569" comment="IBMJava2-SDK less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033570" comment="IBMJava2-SDK less than 1.4.2-0.92.6"/>
		</criteria>
	</criteria>
	<!-- 90864743019d987b918e58f9bba908b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2789</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2789" source="CVE"/>
	<description>
	The BMP image parser in Sun Java Development Kit (JDK) before 1.5.0_11-b03 and 1.6.x before 1.6.0_01-b06, and Sun Java Runtime Environment in JDK and JRE 6, JDK and JRE 5.0 Update 10 and earlier, SDK and JRE 1.4.2_14 and earlier, and SDK and JRE 1.3.1_19 and earlier, when running on Unix/Linux systems, allows remote attackers to cause a denial of service (JVM hang) via untrusted applets or applications that open arbitrary local files via a crafted BMP file, such as /dev/tty.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1d3d4cc05bdfc425f875a1d8a7ef9b7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033567" comment="IBMJava2-JRE less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033568" comment="IBMJava2-JRE less than 1.4.2-0.92.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033569" comment="IBMJava2-SDK less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033570" comment="IBMJava2-SDK less than 1.4.2-0.92.6"/>
		</criteria>
	</criteria>
	<!-- 90864743019d987b918e58f9bba908b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2833</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2833" source="CVE"/>
	<description>
	Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.
	</description>
 </metadata>
<!-- 4ad8c09c15e091a9cf432b82debd5044 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033571" comment="emacs-el less than 21.3-185.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033572" comment="emacs-info less than 21.3-185.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033573" comment="emacs-nox less than 21.3-185.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033574" comment="emacs-x11 less than 21.3-185.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033575" comment="emacs less than 21.3-185.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2867</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2867" source="CVE"/>
	<description>
	Multiple vulnerabilities in the layout engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) via vectors related to dangling pointers, heap corruption, signed/unsigned, and other issues.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2868</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2868" source="CVE"/>
	<description>
	Multiple vulnerabilities in the JavaScript engine for Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, Thunderbird 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2869</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2869" source="CVE"/>
	<description>
	The form autocomplete feature in Mozilla Firefox 1.5.x before 1.5.0.12, 2.x before 2.0.0.4, and possibly earlier versions, allows remote attackers to cause a denial of service (persistent temporary CPU consumption) via a large number of characters in a submitted form.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2870</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2870" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to bypass the same-origin policy and conduct cross-site scripting (XSS) and other attacks by using the addEventListener method to add an event listener for a site, which is executed in the context of that site.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2871</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2871" source="CVE"/>
	<description>
	Mozilla Firefox 1.5.x before 1.5.0.12 and 2.x before 2.0.0.4, and SeaMonkey 1.0.9 and 1.1.2, allows remote attackers to spoof or hide the browser chrome, such as the location bar, by placing XUL popups outside of the browser's content pane.  NOTE: this issue can be leveraged for phishing and other attacks.
	</description>
 </metadata>
<!-- 2b5bd41bb32a85566962cdcd145ebc9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033471" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031235" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031236" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031237" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031238" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031239" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031240" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031242" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031243" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031244" comment="mozilla less than 1.8_seamonkey_1.0.9-1.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2872</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2872" source="CVE"/>
	<description>
	Multiple integer overflows in the chunk_split function in PHP 5 before 5.2.3 and PHP 4 before 4.4.8 allow remote attackers to cause a denial of service (crash) or execute arbitrary code via the (1) chunks, (2) srclen, and (3) chunklen arguments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34e44a394ab66fcf29b156158bf01627 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033418" comment="apache-mod_php4 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033419" comment="apache2-mod_php4 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033420" comment="mod_php4-apache2 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033421" comment="mod_php4-core less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033422" comment="mod_php4-servlet less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033423" comment="php4-bcmath less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033424" comment="php4-bz2 less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033425" comment="php4-calendar less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033426" comment="php4-ctype less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033427" comment="php4-curl less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033428" comment="php4-dba less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033429" comment="php4-dbase less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033430" comment="php4-devel less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033431" comment="php4-domxml less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033432" comment="php4-exif less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033433" comment="php4-fastcgi less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033434" comment="php4-filepro less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033435" comment="php4-ftp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033436" comment="php4-gd less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033437" comment="php4-gettext less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033438" comment="php4-gmp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033439" comment="php4-iconv less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033440" comment="php4-imap less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033441" comment="php4-ldap less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033442" comment="php4-mbstring less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033443" comment="php4-mcal less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033444" comment="php4-mcrypt less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033445" comment="php4-mhash less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033446" comment="php4-mime_magic less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033447" comment="php4-mysql less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033448" comment="php4-pear less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033449" comment="php4-pgsql less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033450" comment="php4-qtdom less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033451" comment="php4-readline less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033452" comment="php4-recode less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033453" comment="php4-session less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033454" comment="php4-shmop less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033455" comment="php4-snmp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033456" comment="php4-sockets less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033457" comment="php4-swf less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033458" comment="php4-sysvsem less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033459" comment="php4-sysvshm less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033460" comment="php4-unixODBC less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033461" comment="php4-wddx less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033462" comment="php4-xslt less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033463" comment="php4-yp less than 4.3.4-43.79"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033464" comment="php4-zlib less than 4.3.4-43.79"/>
		</criteria>
	</criteria>
	<!-- f1255e10262bd8b24adcb137ab61417e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2876</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2876" source="CVE"/>
	<description>
	The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04a995573698ff4214863690f5aeba5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033497" comment="kernel-64k-pagesize less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033499" comment="kernel-sn2 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 1c8f3645ba3d5dbc64e0896cf7c55997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033500" comment="kernel-s390x-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033501" comment="kernel-s390x less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 79ad90eebcf05ad4304479c0d22b0b96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 7e7048f8f7ffd90614b0e72e6fbe6a95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 977651f223935a83c8e78063a5d4a199 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033505" comment="kernel-s390-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033506" comment="kernel-s390 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- db175614c512157df22f534c459eec62 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033507" comment="kernel-iseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033508" comment="kernel-pmac64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033509" comment="kernel-pseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2926</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926" source="CVE"/>
	<description>
	ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolver questions or sending NOTIFY messages to slave name servers, which makes it easier for remote attackers to guess the next query id and perform DNS cache poisoning.
	</description>
 </metadata>
<!-- c9ea0bc14d84824dc2e54f71907d6322 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031336" comment="bind-devel less than 9.2.3-76.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033576" comment="bind-utils-32bit less than 9-200707301359"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031337" comment="bind-utils-32bit less than 9-200707301447"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033577" comment="bind-utils-64bit less than 9-200707301401"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033578" comment="bind-utils-x86 less than 9-200707301447"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031338" comment="bind-utils less than 9.2.3-76.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031339" comment="bind less than 9.2.3-76.34"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2953</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2953" source="CVE"/>
	<description>
	Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
	</description>
 </metadata>
<!-- a2f66f84efb210e33202eedc43e1e606 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031342" comment="gvim less than 6.2-235.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3004</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3004" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-2788.  Reason: This candidate is a duplicate of CVE-2007-2788.  Notes: All CVE users should reference CVE-2007-2788 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1d3d4cc05bdfc425f875a1d8a7ef9b7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033567" comment="IBMJava2-JRE less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033568" comment="IBMJava2-JRE less than 1.4.2-0.92.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033569" comment="IBMJava2-SDK less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033570" comment="IBMJava2-SDK less than 1.4.2-0.92.6"/>
		</criteria>
	</criteria>
	<!-- 90864743019d987b918e58f9bba908b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3005</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3005" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2007-2789.  Reason: This candidate is a duplicate of CVE-2007-2789.  Notes: All CVE users should reference CVE-2007-2789 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1d3d4cc05bdfc425f875a1d8a7ef9b7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033567" comment="IBMJava2-JRE less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033568" comment="IBMJava2-JRE less than 1.4.2-0.92.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033569" comment="IBMJava2-SDK less than 1.4.2-0.92.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033570" comment="IBMJava2-SDK less than 1.4.2-0.92.6"/>
		</criteria>
	</criteria>
	<!-- 90864743019d987b918e58f9bba908b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031164" comment="java2-jre less than 1.4.2-129.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031165" comment="java2 less than 1.4.2-129.30"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3007</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3007" source="CVE"/>
	<description>
	PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string.  NOTE: this issue might also involve the realpath function.
	</description>
 </metadata>
<!-- 34e44a394ab66fcf29b156158bf01627 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033418" comment="apache-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033419" comment="apache2-mod_php4 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033420" comment="mod_php4-apache2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033421" comment="mod_php4-core less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033422" comment="mod_php4-servlet less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033423" comment="php4-bcmath less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033424" comment="php4-bz2 less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033425" comment="php4-calendar less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033426" comment="php4-ctype less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033427" comment="php4-curl less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033428" comment="php4-dba less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033429" comment="php4-dbase less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033430" comment="php4-devel less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033431" comment="php4-domxml less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033432" comment="php4-exif less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033433" comment="php4-fastcgi less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033434" comment="php4-filepro less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033435" comment="php4-ftp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033436" comment="php4-gd less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033437" comment="php4-gettext less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033438" comment="php4-gmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033439" comment="php4-iconv less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033440" comment="php4-imap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033441" comment="php4-ldap less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033442" comment="php4-mbstring less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033443" comment="php4-mcal less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033444" comment="php4-mcrypt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033445" comment="php4-mhash less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033446" comment="php4-mime_magic less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033447" comment="php4-mysql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033448" comment="php4-pear less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033449" comment="php4-pgsql less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033450" comment="php4-qtdom less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033451" comment="php4-readline less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033452" comment="php4-recode less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033453" comment="php4-session less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033454" comment="php4-shmop less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033455" comment="php4-snmp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033456" comment="php4-sockets less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033457" comment="php4-swf less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033458" comment="php4-sysvsem less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033459" comment="php4-sysvshm less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033460" comment="php4-unixODBC less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033461" comment="php4-wddx less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033462" comment="php4-xslt less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033463" comment="php4-yp less than 4.3.4-43.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033464" comment="php4-zlib less than 4.3.4-43.79"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3023</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3023" source="CVE"/>
	<description>
	unsp.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 does not properly calculate the end of a certain buffer, with unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 5a3e85703885a03d41664f02c24200e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3024</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3024" source="CVE"/>
	<description>
	libclamav/others.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 uses insecure permissions for temporary files that are created by the cli_gentempstream function in clamd/clamdscan, which might allow local users to read sensitive files.
	</description>
 </metadata>
<!-- 5a3e85703885a03d41664f02c24200e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3025</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3025" source="CVE"/>
	<description>
	Unspecified vulnerability in libclamav/phishcheck.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1, when running on Solaris, allows remote attackers to cause a denial of service (hang) via unknown vectors related to the isURL function and regular expressions.
	</description>
 </metadata>
<!-- 5a3e85703885a03d41664f02c24200e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3089</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3089" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3105</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3105" source="CVE"/>
	<description>
	Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold to a value greater than the output pool size, which triggers writing random numbers to the stack by the pool transfer function involving "bound check ordering".  NOTE: this issue might only cross privilege boundaries in environments that have granular assignment of privileges for root.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04a995573698ff4214863690f5aeba5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033497" comment="kernel-64k-pagesize less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033499" comment="kernel-sn2 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 1c8f3645ba3d5dbc64e0896cf7c55997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033500" comment="kernel-s390x-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033501" comment="kernel-s390x less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 79ad90eebcf05ad4304479c0d22b0b96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 7e7048f8f7ffd90614b0e72e6fbe6a95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 977651f223935a83c8e78063a5d4a199 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033505" comment="kernel-s390-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033506" comment="kernel-s390 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- db175614c512157df22f534c459eec62 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033507" comment="kernel-iseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033508" comment="kernel-pmac64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033509" comment="kernel-pseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3106</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106" source="CVE"/>
	<description>
	lib/info.c in libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via invalid (1) blocksize_0 and (2) blocksize_1 values, which trigger a "heap overwrite" in the _01inverse function in res0.c.  NOTE: this issue has been RECAST so that CVE-2007-4029 handles additional vectors.
	</description>
 </metadata>
<!-- 4698cefcb7095f1da9b8e80af41f9954 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033580" comment="libvorbis-32bit less than 9-200707091422"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031355" comment="libvorbis-32bit less than 9-200707091633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033581" comment="libvorbis-64bit less than 9-200707091536"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031356" comment="libvorbis-devel less than 1.0.1-56.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033582" comment="libvorbis-x86 less than 9-200707091629"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031357" comment="libvorbis less than 1.0.1-56.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3122</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3122" source="CVE"/>
	<description>
	The parsing engine in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to bypass scanning via a RAR file with a header flag value of 10, which can be processed by WinRAR.
	</description>
 </metadata>
<!-- 5a3e85703885a03d41664f02c24200e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3123</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3123" source="CVE"/>
	<description>
	unrar.c in libclamav in ClamAV before 0.90.3 and 0.91 before 0.91rc1 allows remote attackers to cause a denial of service (core dump) via a crafted RAR file with a modified vm_codesize value, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 5a3e85703885a03d41664f02c24200e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033510" comment="clamav less than 0.90.3-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3285</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3285" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5, when run on Windows, allows remote attackers to bypass file type checks and possibly execute programs via a (1) file:/// or (2) resource: URI with a dangerous extension, followed by a NULL byte (%00) and a safer extension, which causes Firefox to treat the requested file differently than Windows would.
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3304</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304" source="CVE"/>
	<description>
	Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033290" comment="apache2-doc less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033291" comment="apache2-example-pages less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3377</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3377" source="CVE"/>
	<description>
	Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
	</description>
 </metadata>
<!-- a7dbc8f043cc91ce48289ac7a197a582 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031364" comment="perl-Net-DNS less than 0.46-27.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3382</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3382" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032896" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032897" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032898" comment="jakarta-tomcat-doc less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032899" comment="jakarta-tomcat-examples less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3385</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3385" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032896" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032897" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032898" comment="jakarta-tomcat-doc less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032899" comment="jakarta-tomcat-examples less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3387</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387" source="CVE"/>
	<description>
	Integer overflow in the StreamPredictor::StreamPredictor function in xpdf 3.02, as used in (1) poppler before 0.5.91, (2) gpdf before 2.8.2, (3) kpdf, (4) kdegraphics, (5) CUPS, (6) PDFedit, and other products, might allow remote attackers to execute arbitrary code via a crafted PDF file that triggers a stack-based buffer overflow in the StreamPredictor::getNextLine function.
	</description>
 </metadata>
<!-- 16009a293ca600db0c864de5b3fab847 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031365" comment="cups-client less than 1.1.20-108.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031366" comment="cups-devel less than 1.1.20-108.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033583" comment="cups-libs-32bit less than 9-200708071549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031367" comment="cups-libs-32bit less than 9-200708071552"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033584" comment="cups-libs-64bit less than 9-200708071548"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033585" comment="cups-libs-x86 less than 9-200708071552"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031368" comment="cups-libs less than 1.1.20-108.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031369" comment="cups less than 1.1.20-108.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3388</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.
	</description>
 </metadata>
<!-- eac35f375ac5bb22efa8b828b221e0bf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033586" comment="qt3-32bit less than 9-200707162050"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031370" comment="qt3-32bit less than 9-200707170221"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033587" comment="qt3-64bit less than 9-200707162127"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033588" comment="qt3-devel-32bit less than 9-200707162050"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031371" comment="qt3-devel-32bit less than 9-200707170221"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033589" comment="qt3-devel-64bit less than 9-200707162127"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031372" comment="qt3-devel less than 3.3.1-36.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031373" comment="qt3-non-mt less than 3.3.1-41.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033590" comment="qt3-x86 less than 9-200707170258"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031374" comment="qt3 less than 3.3.1-36.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3389</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3389" source="CVE"/>
	<description>
	Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3390</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3390" source="CVE"/>
	<description>
	Wireshark 0.99.5 and 0.10.x up to 0.10.14, when running on certain systems, allows remote attackers to cause a denial of service (crash) via crafted iSeries capture files that trigger a SIGTRAP.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3391</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3391" source="CVE"/>
	<description>
	Wireshark 0.99.5 allows remote attackers to cause a denial of service (memory consumption) via a malformed DCP ETSI packet that triggers an infinite loop.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3392</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3392" source="CVE"/>
	<description>
	Wireshark before 0.99.6 allows remote attackers to cause a denial of service via malformed (1) SSL or (2) MMS packets that trigger an infinite loop.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3393</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3393" source="CVE"/>
	<description>
	Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets.
	</description>
 </metadata>
<!-- 254e16f8849045414f4aad7942b25e58 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031375" comment="ethereal less than 0.10.13-2.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3409</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3409" source="CVE"/>
	<description>
	Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
	</description>
 </metadata>
<!-- a7dbc8f043cc91ce48289ac7a197a582 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031364" comment="perl-Net-DNS less than 0.46-27.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3472</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3472" source="CVE"/>
	<description>
	Integer overflow in gdImageCreateTrueColor function in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to have unspecified attack vectors and impact.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0b5233db2a91ad6ad12b126125da3b1f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033591" comment="gd-devel less than 2.0.22-65.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033592" comment="gd less than 2.0.22-65.14"/>
		</criteria>
	</criteria>
	<!-- b1c0b8d3ce8da450fbeea2ef4bac63c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033511" comment="apache-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033512" comment="apache2-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033513" comment="mod_php4-apache2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033514" comment="mod_php4-core less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033515" comment="mod_php4-servlet less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033516" comment="php4-bcmath less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033517" comment="php4-bz2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033518" comment="php4-calendar less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033519" comment="php4-ctype less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033520" comment="php4-curl less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033521" comment="php4-dba less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033522" comment="php4-dbase less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033523" comment="php4-devel less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033524" comment="php4-domxml less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033525" comment="php4-exif less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033526" comment="php4-fastcgi less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033527" comment="php4-filepro less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033528" comment="php4-ftp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033529" comment="php4-gd less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033530" comment="php4-gettext less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033531" comment="php4-gmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033532" comment="php4-iconv less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033533" comment="php4-imap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033534" comment="php4-ldap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033535" comment="php4-mbstring less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033536" comment="php4-mcal less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033537" comment="php4-mcrypt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033538" comment="php4-mhash less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033539" comment="php4-mime_magic less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033540" comment="php4-mysql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033541" comment="php4-pear less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033542" comment="php4-pgsql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033543" comment="php4-qtdom less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033544" comment="php4-readline less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033545" comment="php4-recode less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033546" comment="php4-session less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033547" comment="php4-shmop less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033548" comment="php4-snmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033549" comment="php4-sockets less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033550" comment="php4-swf less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033551" comment="php4-sysvsem less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033552" comment="php4-sysvshm less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033553" comment="php4-unixODBC less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033554" comment="php4-wddx less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033555" comment="php4-xslt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033556" comment="php4-yp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033557" comment="php4-zlib less than 4.3.4-43.82"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3475</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3475" source="CVE"/>
	<description>
	The GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via a GIF image that has no global color map.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0b5233db2a91ad6ad12b126125da3b1f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033591" comment="gd-devel less than 2.0.22-65.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033592" comment="gd less than 2.0.22-65.14"/>
		</criteria>
	</criteria>
	<!-- b1c0b8d3ce8da450fbeea2ef4bac63c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033511" comment="apache-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033512" comment="apache2-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033513" comment="mod_php4-apache2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033514" comment="mod_php4-core less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033515" comment="mod_php4-servlet less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033516" comment="php4-bcmath less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033517" comment="php4-bz2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033518" comment="php4-calendar less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033519" comment="php4-ctype less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033520" comment="php4-curl less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033521" comment="php4-dba less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033522" comment="php4-dbase less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033523" comment="php4-devel less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033524" comment="php4-domxml less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033525" comment="php4-exif less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033526" comment="php4-fastcgi less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033527" comment="php4-filepro less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033528" comment="php4-ftp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033529" comment="php4-gd less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033530" comment="php4-gettext less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033531" comment="php4-gmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033532" comment="php4-iconv less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033533" comment="php4-imap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033534" comment="php4-ldap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033535" comment="php4-mbstring less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033536" comment="php4-mcal less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033537" comment="php4-mcrypt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033538" comment="php4-mhash less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033539" comment="php4-mime_magic less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033540" comment="php4-mysql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033541" comment="php4-pear less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033542" comment="php4-pgsql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033543" comment="php4-qtdom less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033544" comment="php4-readline less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033545" comment="php4-recode less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033546" comment="php4-session less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033547" comment="php4-shmop less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033548" comment="php4-snmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033549" comment="php4-sockets less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033550" comment="php4-swf less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033551" comment="php4-sysvsem less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033552" comment="php4-sysvshm less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033553" comment="php4-unixODBC less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033554" comment="php4-wddx less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033555" comment="php4-xslt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033556" comment="php4-yp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033557" comment="php4-zlib less than 4.3.4-43.82"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3476</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3476" source="CVE"/>
	<description>
	Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0b5233db2a91ad6ad12b126125da3b1f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033591" comment="gd-devel less than 2.0.22-65.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033592" comment="gd less than 2.0.22-65.14"/>
		</criteria>
	</criteria>
	<!-- b1c0b8d3ce8da450fbeea2ef4bac63c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033511" comment="apache-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033512" comment="apache2-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033513" comment="mod_php4-apache2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033514" comment="mod_php4-core less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033515" comment="mod_php4-servlet less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033516" comment="php4-bcmath less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033517" comment="php4-bz2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033518" comment="php4-calendar less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033519" comment="php4-ctype less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033520" comment="php4-curl less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033521" comment="php4-dba less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033522" comment="php4-dbase less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033523" comment="php4-devel less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033524" comment="php4-domxml less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033525" comment="php4-exif less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033526" comment="php4-fastcgi less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033527" comment="php4-filepro less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033528" comment="php4-ftp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033529" comment="php4-gd less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033530" comment="php4-gettext less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033531" comment="php4-gmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033532" comment="php4-iconv less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033533" comment="php4-imap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033534" comment="php4-ldap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033535" comment="php4-mbstring less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033536" comment="php4-mcal less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033537" comment="php4-mcrypt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033538" comment="php4-mhash less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033539" comment="php4-mime_magic less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033540" comment="php4-mysql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033541" comment="php4-pear less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033542" comment="php4-pgsql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033543" comment="php4-qtdom less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033544" comment="php4-readline less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033545" comment="php4-recode less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033546" comment="php4-session less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033547" comment="php4-shmop less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033548" comment="php4-snmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033549" comment="php4-sockets less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033550" comment="php4-swf less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033551" comment="php4-sysvsem less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033552" comment="php4-sysvshm less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033553" comment="php4-unixODBC less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033554" comment="php4-wddx less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033555" comment="php4-xslt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033556" comment="php4-yp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033557" comment="php4-zlib less than 4.3.4-43.82"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3477</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3477" source="CVE"/>
	<description>
	The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0b5233db2a91ad6ad12b126125da3b1f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033591" comment="gd-devel less than 2.0.22-65.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033592" comment="gd less than 2.0.22-65.14"/>
		</criteria>
	</criteria>
	<!-- b1c0b8d3ce8da450fbeea2ef4bac63c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033511" comment="apache-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033512" comment="apache2-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033513" comment="mod_php4-apache2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033514" comment="mod_php4-core less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033515" comment="mod_php4-servlet less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033516" comment="php4-bcmath less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033517" comment="php4-bz2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033518" comment="php4-calendar less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033519" comment="php4-ctype less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033520" comment="php4-curl less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033521" comment="php4-dba less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033522" comment="php4-dbase less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033523" comment="php4-devel less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033524" comment="php4-domxml less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033525" comment="php4-exif less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033526" comment="php4-fastcgi less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033527" comment="php4-filepro less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033528" comment="php4-ftp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033529" comment="php4-gd less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033530" comment="php4-gettext less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033531" comment="php4-gmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033532" comment="php4-iconv less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033533" comment="php4-imap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033534" comment="php4-ldap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033535" comment="php4-mbstring less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033536" comment="php4-mcal less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033537" comment="php4-mcrypt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033538" comment="php4-mhash less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033539" comment="php4-mime_magic less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033540" comment="php4-mysql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033541" comment="php4-pear less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033542" comment="php4-pgsql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033543" comment="php4-qtdom less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033544" comment="php4-readline less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033545" comment="php4-recode less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033546" comment="php4-session less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033547" comment="php4-shmop less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033548" comment="php4-snmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033549" comment="php4-sockets less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033550" comment="php4-swf less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033551" comment="php4-sysvsem less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033552" comment="php4-sysvshm less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033553" comment="php4-unixODBC less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033554" comment="php4-wddx less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033555" comment="php4-xslt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033556" comment="php4-yp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033557" comment="php4-zlib less than 4.3.4-43.82"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3478</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3478" source="CVE"/>
	<description>
	Race condition in gdImageStringFTEx (gdft_draw_bitmap) in gdft.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash) via unspecified vectors, possibly involving truetype font (TTF) support.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0b5233db2a91ad6ad12b126125da3b1f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033591" comment="gd-devel less than 2.0.22-65.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033592" comment="gd less than 2.0.22-65.14"/>
		</criteria>
	</criteria>
	<!-- b1c0b8d3ce8da450fbeea2ef4bac63c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033511" comment="apache-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033512" comment="apache2-mod_php4 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033513" comment="mod_php4-apache2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033514" comment="mod_php4-core less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033515" comment="mod_php4-servlet less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033516" comment="php4-bcmath less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033517" comment="php4-bz2 less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033518" comment="php4-calendar less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033519" comment="php4-ctype less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033520" comment="php4-curl less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033521" comment="php4-dba less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033522" comment="php4-dbase less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033523" comment="php4-devel less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033524" comment="php4-domxml less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033525" comment="php4-exif less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033526" comment="php4-fastcgi less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033527" comment="php4-filepro less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033528" comment="php4-ftp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033529" comment="php4-gd less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033530" comment="php4-gettext less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033531" comment="php4-gmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033532" comment="php4-iconv less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033533" comment="php4-imap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033534" comment="php4-ldap less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033535" comment="php4-mbstring less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033536" comment="php4-mcal less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033537" comment="php4-mcrypt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033538" comment="php4-mhash less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033539" comment="php4-mime_magic less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033540" comment="php4-mysql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033541" comment="php4-pear less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033542" comment="php4-pgsql less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033543" comment="php4-qtdom less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033544" comment="php4-readline less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033545" comment="php4-recode less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033546" comment="php4-session less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033547" comment="php4-shmop less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033548" comment="php4-snmp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033549" comment="php4-sockets less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033550" comment="php4-swf less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033551" comment="php4-sysvsem less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033552" comment="php4-sysvshm less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033553" comment="php4-unixODBC less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033554" comment="php4-wddx less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033555" comment="php4-xslt less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033556" comment="php4-yp less than 4.3.4-43.82"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033557" comment="php4-zlib less than 4.3.4-43.82"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3511</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3511" source="CVE"/>
	<description>
	The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3655</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3655" source="CVE"/>
	<description>
	Stack-based buffer overflow in javaws.exe in Sun Java Web Start in JRE 5.0 Update 11 and earlier, and 6.0 Update 1 and earlier, allows remote attackers to execute arbitrary code via a long codebase attribute in a JNLP file.
	</description>
 </metadata>
<!-- 1d3d4cc05bdfc425f875a1d8a7ef9b7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033567" comment="IBMJava2-JRE less than 1.4.2-0.92.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033568" comment="IBMJava2-JRE less than 1.4.2-0.92.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033569" comment="IBMJava2-SDK less than 1.4.2-0.92.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033570" comment="IBMJava2-SDK less than 1.4.2-0.92.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3656</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3656" source="CVE"/>
	<description>
	Mozilla Firefox before 1.8.0.13 and 1.8.1.x before 1.8.1.5 does not perform a security zone check when processing a wyciwyg URI, which allows remote attackers to obtain sensitive information, poison the browser cache, and possibly enable further attack vectors via (1) HTTP 302 redirect controls, (2) XMLHttpRequest, or (3) view-source URIs.
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3670</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3670" source="CVE"/>
	<description>
	Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe.  NOTE: it has been debated as to whether the issue is in Internet Explorer or Firefox. As of 20070711, it is CVE's opinion that IE appears to be failing to properly delimit the URL argument when invoking Firefox, and this issue could arise with other protocol handlers in IE as well. However, Mozilla has stated that it will address the issue with a "defense in depth" fix that will "prevent IE from sending Firefox malicious data."
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3698</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3698" source="CVE"/>
	<description>
	The Java Secure Socket Extension (JSSE) in Sun JDK and JRE 6 Update 1 and earlier, JDK and JRE 5.0 Updates 7 through 11, and SDK and JRE 1.4.2_11 through 1.4.2_14, when using JSSE for SSL/TLS support, allows remote attackers to cause a denial of service (CPU consumption) via certain SSL/TLS handshake requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3725</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3725" source="CVE"/>
	<description>
	The RAR VM (unrarvm.c) in Clam Antivirus (ClamAV) before 0.91 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted RAR archive, resulting in a NULL pointer dereference.
	</description>
 </metadata>
<!-- 6df6eaf6b7af091f4f24390128e14dae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033599" comment="clamav less than 0.91.1-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3734</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3734" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3735</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3735" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 2.0.0.5 and Thunderbird before 2.0.0.5 allow remote attackers to cause a denial of service (crash) via unspecified vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3736</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3736" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.5 allows remote attackers to inject arbitrary web script "into another site's context" via a "timing issue" involving the (1) addEventListener or (2) setTimeout function, probably by setting events that activate after the context has changed.
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3737</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3737" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.5 allows remote attackers to execute arbitrary code with chrome privileges by calling an event handler from an unspecified "element outside of a document."
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3738</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3738" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.5 allow remote attackers to execute arbitrary code via a crafted XPCNativeWrapper.
	</description>
 </metadata>
<!-- d91b73c3c1e2666666b5dd6d36be8cbf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033579" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031345" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031346" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031347" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031348" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031349" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031350" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031352" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031353" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031354" comment="mozilla less than 1.8_seamonkey_1.0.9-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3798</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798" source="CVE"/>
	<description>
	Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
	</description>
 </metadata>
<!-- cb0a4294e031a1d8cbe15085dd6e88eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031376" comment="tcpdump less than 3.8.1-49.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3799</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3799" source="CVE"/>
	<description>
	The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.
	</description>
 </metadata>
<!-- b1c0b8d3ce8da450fbeea2ef4bac63c3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033511" comment="apache-mod_php4 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033512" comment="apache2-mod_php4 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033513" comment="mod_php4-apache2 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033514" comment="mod_php4-core less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033515" comment="mod_php4-servlet less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033516" comment="php4-bcmath less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033517" comment="php4-bz2 less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033518" comment="php4-calendar less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033519" comment="php4-ctype less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033520" comment="php4-curl less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033521" comment="php4-dba less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033522" comment="php4-dbase less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033523" comment="php4-devel less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033524" comment="php4-domxml less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033525" comment="php4-exif less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033526" comment="php4-fastcgi less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033527" comment="php4-filepro less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033528" comment="php4-ftp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033529" comment="php4-gd less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033530" comment="php4-gettext less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033531" comment="php4-gmp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033532" comment="php4-iconv less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033533" comment="php4-imap less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033534" comment="php4-ldap less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033535" comment="php4-mbstring less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033536" comment="php4-mcal less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033537" comment="php4-mcrypt less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033538" comment="php4-mhash less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033539" comment="php4-mime_magic less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033540" comment="php4-mysql less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033541" comment="php4-pear less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033542" comment="php4-pgsql less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033543" comment="php4-qtdom less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033544" comment="php4-readline less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033545" comment="php4-recode less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033546" comment="php4-session less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033547" comment="php4-shmop less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033548" comment="php4-snmp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033549" comment="php4-sockets less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033550" comment="php4-swf less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033551" comment="php4-sysvsem less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033552" comment="php4-sysvshm less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033553" comment="php4-unixODBC less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033554" comment="php4-wddx less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033555" comment="php4-xslt less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033556" comment="php4-yp less than 4.3.4-43.82"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033557" comment="php4-zlib less than 4.3.4-43.82"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3844</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3844" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.5, Thunderbird 2.0.0.5 and before 1.5.0.13, and SeaMonkey 1.1.3 allows remote attackers to conduct cross-site scripting (XSS) attacks with chrome privileges via an addon that inserts a (1) javascript: or (2) data: link into an about:blank document loaded by chrome via (a) the window.open function or (b) a content.location assignment, aka "Cross Context Scripting." NOTE: this issue is caused by a CVE-2007-3089 regression.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3845</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3845" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.6, Thunderbird before 1.5.0.13 and 2.x before 2.0.0.6, and SeaMonkey before 1.1.4 allow remote attackers to execute arbitrary commands via certain vectors associated with launching "a file handling program based on the file extension at the end of the URI," a variant of CVE-2007-4041.  NOTE: the vendor states that "it is still possible to launch a filetype handler based on extension rather than the registered protocol handler."
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3847</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847" source="CVE"/>
	<description>
	The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033290" comment="apache2-doc less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033291" comment="apache2-example-pages less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3848" source="CVE"/>
	<description>
	Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04a995573698ff4214863690f5aeba5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033497" comment="kernel-64k-pagesize less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033499" comment="kernel-sn2 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 0e880b69d2507563c8d20082866b36d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033600" comment="kernel-64k-pagesize less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033602" comment="kernel-sn2 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 11f2685248dd1c55897b82c840b7d545 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033603" comment="kernel-s390-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033604" comment="kernel-s390 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 1c8f3645ba3d5dbc64e0896cf7c55997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033500" comment="kernel-s390x-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033501" comment="kernel-s390x less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 436375e56cfcb119e5e42c29cf234297 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 6e07221ab94b5e49d7d361fb01b8e5ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033606" comment="kernel-iseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033607" comment="kernel-pmac64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033608" comment="kernel-pseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 7494a86d66f662e33c4a4a005ae22828 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033609" comment="kernel-s390x-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033610" comment="kernel-s390x less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 79ad90eebcf05ad4304479c0d22b0b96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 7e7048f8f7ffd90614b0e72e6fbe6a95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 977651f223935a83c8e78063a5d4a199 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033505" comment="kernel-s390-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033506" comment="kernel-s390 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- db175614c512157df22f534c459eec62 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033507" comment="kernel-iseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033508" comment="kernel-pmac64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033509" comment="kernel-pseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- ecea9bb7c95d1d842c67c822088572c9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033611" comment="kernel-um less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033612" comment="kernel-xenpae less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033613" comment="um-host-install-initrd less than 1.0-48.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033614" comment="um-host-kernel less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3922</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3922" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) Applet Class Loader in Sun JDK and JRE 5.0 Update 11 and earlier, 6 through 6 Update 1, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to violate the security model for an applet's outbound connections by connecting to certain localhost services running on the machine that loaded the applet.
	</description>
 </metadata>
<!-- 1d3d4cc05bdfc425f875a1d8a7ef9b7e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033567" comment="IBMJava2-JRE less than 1.4.2-0.92.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033568" comment="IBMJava2-JRE less than 1.4.2-0.92.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033569" comment="IBMJava2-SDK less than 1.4.2-0.92.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033570" comment="IBMJava2-SDK less than 1.4.2-0.92.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3996</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3996" source="CVE"/>
	<description>
	Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20073998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-3998</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-3998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3998" source="CVE"/>
	<description>
	The wordwrap function in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, does not properly use the breakcharlen variable, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash, or infinite loop) via certain arguments, as demonstrated by a 'chr(0), 0, ""' argument set.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4029</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029" source="CVE"/>
	<description>
	libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of service via (1) an invalid mapping type, which triggers an out-of-bounds read in the vorbis_info_clear function in info.c, and (2) invalid blocksize values that trigger a segmentation fault in the read function in block.c.
	</description>
 </metadata>
<!-- e1de20bb0558a2ef6763e74cbebc9de3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033615" comment="libvorbis-32bit less than 9-200710221437"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031382" comment="libvorbis-32bit less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033616" comment="libvorbis-64bit less than 9-200710221441"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031383" comment="libvorbis-devel less than 1.0.1-56.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033617" comment="libvorbis-x86 less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031384" comment="libvorbis less than 1.0.1-56.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4033</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4033" source="CVE"/>
	<description>
	Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent attackers to execute arbitrary code via a long FileName parameter.  NOTE: this issue was originally reported to be in the imagepsloadfont function in php_gd2.dll in the gd (PHP_GD2) extension in PHP 5.2.3.
	</description>
 </metadata>
<!-- b97ae6426accea9a0d680150de023a25 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031385" comment="t1lib-devel less than 1.3.1-569.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031386" comment="t1lib less than 1.3.1-569.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4065</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065" source="CVE"/>
	<description>
	lib/vorbisfile.c in libvorbisfile in Xiph.Org libvorbis before 1.2.0 allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted OGG file, aka trac Changeset 13217.
	</description>
 </metadata>
<!-- e1de20bb0558a2ef6763e74cbebc9de3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033615" comment="libvorbis-32bit less than 9-200710221437"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031382" comment="libvorbis-32bit less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033616" comment="libvorbis-64bit less than 9-200710221441"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031383" comment="libvorbis-devel less than 1.0.1-56.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033617" comment="libvorbis-x86 less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031384" comment="libvorbis less than 1.0.1-56.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4066</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066" source="CVE"/>
	<description>
	Multiple buffer overflows in Xiph.Org libvorbis before 1.2.0 allow context-dependent attackers to cause a denial of service or have other unspecified impact via a crafted OGG file, aka trac Changesets 13162, 13168, 13169, 13170, 13172, 13211, and 13215, as demonstrated by an overflow in oggenc.exe related to the _psy_noiseguards_8 array.
	</description>
 </metadata>
<!-- e1de20bb0558a2ef6763e74cbebc9de3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033615" comment="libvorbis-32bit less than 9-200710221437"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031382" comment="libvorbis-32bit less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033616" comment="libvorbis-64bit less than 9-200710221441"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031383" comment="libvorbis-devel less than 1.0.1-56.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033617" comment="libvorbis-x86 less than 9-200710221440"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031384" comment="libvorbis less than 1.0.1-56.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4091</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4091" source="CVE"/>
	<description>
	Multiple off-by-one errors in the sender.c in rsync 2.6.9 might allow remote attackers to execute arbitrary code via directory names that are not properly handled when calling the f_name function.
	</description>
 </metadata>
<!-- 3e5d0b448dcfa1c79607fd3bf6cf58f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031387" comment="rsync less than 2.6.2-8.23.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4131</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4131" source="CVE"/>
	<description>
	Directory traversal vulnerability in the contains_dot_dot function in src/names.c in GNU tar allows user-assisted remote attackers to overwrite arbitrary files via certain //.. (slash slash dot dot) sequences in directory symlinks in a TAR archive.
	</description>
 </metadata>
<!-- 2506227b7bd914b11632b5701384104a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030401" comment="tar less than 1.13.25-325.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4137</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137" source="CVE"/>
	<description>
	Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow.  NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
	</description>
 </metadata>
<!-- e953098cefc9c539cc1334bb9447cb0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033618" comment="qt3-32bit less than 9-200709191342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031388" comment="qt3-32bit less than 9-200709191359"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033619" comment="qt3-64bit less than 9-200709191336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033620" comment="qt3-devel-32bit less than 9-200709191342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031389" comment="qt3-devel-32bit less than 9-200709191359"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033621" comment="qt3-devel-64bit less than 9-200709191336"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031390" comment="qt3-devel-doc less than 3.3.1-36.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031391" comment="qt3-devel-tools less than 3.3.1-35.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031392" comment="qt3-devel less than 3.3.1-36.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031393" comment="qt3-non-mt less than 3.3.1-41.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033622" comment="qt3-x86 less than 9-200709191359"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031394" comment="qt3 less than 3.3.1-36.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4224</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4224" source="CVE"/>
	<description>
	KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval and changing the window.location property.
	</description>
 </metadata>
<!-- 8218149bb971b488abdce21b4d34da2e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033623" comment="kdelibs3-32bit less than 9-200709251549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031395" comment="kdelibs3-32bit less than 9-200709251619"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033624" comment="kdelibs3-64bit less than 9-200709251619"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031396" comment="kdelibs3-devel-doc less than 3.2.1-44.71.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031397" comment="kdelibs3-devel less than 3.2.1-44.71.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033625" comment="kdelibs3-x86 less than 9-200709251619"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031398" comment="kdelibs3 less than 3.2.1-44.71.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4308</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4308" source="CVE"/>
	<description>
	The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e880b69d2507563c8d20082866b36d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033600" comment="kernel-64k-pagesize less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033602" comment="kernel-sn2 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 11f2685248dd1c55897b82c840b7d545 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033603" comment="kernel-s390-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033604" comment="kernel-s390 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 436375e56cfcb119e5e42c29cf234297 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 6e07221ab94b5e49d7d361fb01b8e5ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033606" comment="kernel-iseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033607" comment="kernel-pmac64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033608" comment="kernel-pseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 7494a86d66f662e33c4a4a005ae22828 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033609" comment="kernel-s390x-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033610" comment="kernel-s390x less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- ecea9bb7c95d1d842c67c822088572c9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033611" comment="kernel-um less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033612" comment="kernel-xenpae less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033613" comment="um-host-install-initrd less than 1.0-48.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033614" comment="um-host-kernel less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4352</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4352" source="CVE"/>
	<description>
	Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler, teTeX, KDE, KOffice, CUPS, and other products, allows remote attackers to trigger memory corruption and execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- f83e024a65d69ebc810d2117815b940d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031402" comment="cups-client less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031403" comment="cups-devel less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031404" comment="cups-libs-32bit less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033626" comment="cups-libs-32bit less than 9-200711080705"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033627" comment="cups-libs-64bit less than 9-200711080640"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033628" comment="cups-libs-x86 less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031405" comment="cups-libs less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031406" comment="cups less than 1.1.20-108.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4381</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4381" source="CVE"/>
	<description>
	Unspecified vulnerability in the font parsing implementation in Sun JDK and JRE 5.0 Update 9 and earlier, and SDK and JRE 1.4.2_14 and earlier, allows remote attackers to perform unauthorized actions via an applet that grants certain privileges to itself.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4394</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4394" source="CVE"/>
	<description>
	Unspecified vulnerability in a "core clean" cron job created by the findutils-locate package on SUSE Linux 10.0 and 10.1 and Enterprise Server 9 and 10 before 20070810 allows local users to delete of arbitrary files via unknown vectors.
	</description>
 </metadata>
<!-- 2b7ce958bc22c722e60a72673ad2f50b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031407" comment="findutils-locate less than 4.1.7-860.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4460</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460" source="CVE"/>
	<description>
	The RenderV2ToFile function in tag_file.cpp in id3lib (aka libid3) 3.8.3 allows local users to overwrite arbitrary files via a symlink attack on a temporary file whose name is constructed from the name of a file being tagged.
	</description>
 </metadata>
<!-- a7900f71ab69d5511012653b1457c53a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031408" comment="id3lib-devel less than 3.8.3-86.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031409" comment="id3lib-examples less than 3.8.3-86.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031410" comment="id3lib less than 3.8.3-86.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4465</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset.  NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
	</description>
 </metadata>
<!-- a5b67777faf570a7e001c677784ac7c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009030964" comment="apache2-devel less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033290" comment="apache2-doc less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033291" comment="apache2-example-pages less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030965" comment="apache2-prefork less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030966" comment="apache2-worker less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030967" comment="apache2 less than 2.0.59-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030963" comment="libapr0 less than 2.0.59-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4476</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476" source="CVE"/>
	<description>
	Buffer overflow in the safer_name_suffix function in GNU tar has unspecified attack vectors and impact, resulting in a "crashing stack."
	</description>
 </metadata>
<!-- 96b722df6f467f951ea7e8580a0fc612 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031411" comment="cpio less than 2.5-324.15.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4510</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4510" source="CVE"/>
	<description>
	ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 9f2651e0ba2d773411bb0303055f2eff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033631" comment="clamav less than 0.91.2-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4560</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4560" source="CVE"/>
	<description>
	clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."
	</description>
 </metadata>
<!-- 9f2651e0ba2d773411bb0303055f2eff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033631" comment="clamav less than 0.91.2-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4565</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4565" source="CVE"/>
	<description>
	sink.c in fetchmail before 6.3.9 allows context-dependent attackers to cause a denial of service (NULL dereference and application crash) by refusing certain warning messages that are sent over SMTP.
	</description>
 </metadata>
<!-- b648a8bc16c65f5f2ec8b36c5886aa3b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031412" comment="fetchmail less than 6.2.5-49.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031413" comment="fetchmailconf less than 6.2.5-49.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4571</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4571" source="CVE"/>
	<description>
	The snd_mem_proc_read function in sound/core/memalloc.c in the Advanced Linux Sound Architecture (ALSA) in the Linux kernel before 2.6.22.8 does not return the correct write size, which allows local users to obtain sensitive information (kernel memory contents) via a small count argument, as demonstrated by multiple reads of /proc/driver/snd-page-alloc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04a995573698ff4214863690f5aeba5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033497" comment="kernel-64k-pagesize less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033499" comment="kernel-sn2 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 1c8f3645ba3d5dbc64e0896cf7c55997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033500" comment="kernel-s390x-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033501" comment="kernel-s390x less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 79ad90eebcf05ad4304479c0d22b0b96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 7e7048f8f7ffd90614b0e72e6fbe6a95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 977651f223935a83c8e78063a5d4a199 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033505" comment="kernel-s390-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033506" comment="kernel-s390 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- db175614c512157df22f534c459eec62 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033507" comment="kernel-iseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033508" comment="kernel-pmac64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033509" comment="kernel-pseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4572</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4572" source="CVE"/>
	<description>
	Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
	</description>
 </metadata>
<!-- a8a615405c62005f443b3e34d922d381 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033632" comment="libsmbclient-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031415" comment="libsmbclient-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033633" comment="libsmbclient-64bit less than 9-200711240034"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031416" comment="libsmbclient-devel less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031417" comment="libsmbclient less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033634" comment="samba-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031418" comment="samba-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033635" comment="samba-client-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031419" comment="samba-client-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031420" comment="samba-client less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031421" comment="samba-doc less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031422" comment="samba-pdb less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031423" comment="samba-python less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031424" comment="samba-vscan less than 0.3.6b-0.26.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033636" comment="samba-winbind-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031425" comment="samba-winbind-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031426" comment="samba-winbind less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031427" comment="samba less than 3.0.20b-3.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4573</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04a995573698ff4214863690f5aeba5c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033497" comment="kernel-64k-pagesize less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033499" comment="kernel-sn2 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 1c8f3645ba3d5dbc64e0896cf7c55997 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033500" comment="kernel-s390x-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033501" comment="kernel-s390x less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 353a84ed7b2f4d437e90169112757674 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 615785e3ad7b9994c5088545f0cfc2b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 79ad90eebcf05ad4304479c0d22b0b96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031285" comment="kernel-bigsmp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033498" comment="kernel-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033502" comment="kernel-um less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033503" comment="um-host-install-initrd less than 1.0-48.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033504" comment="um-host-kernel less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 7e7048f8f7ffd90614b0e72e6fbe6a95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- 977651f223935a83c8e78063a5d4a199 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033505" comment="kernel-s390-debug less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033506" comment="kernel-s390 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
	<!-- db175614c512157df22f534c459eec62 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031286" comment="kernel-default less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033507" comment="kernel-iseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033508" comment="kernel-pmac64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033509" comment="kernel-pseries64 less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031287" comment="kernel-smp less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031288" comment="kernel-source less than 2.6.5-7.287.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031289" comment="kernel-syms less than 2.6.5-7.287.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4619</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4619" source="CVE"/>
	<description>
	Multiple integer overflows in Free Lossless Audio Codec (FLAC) libFLAC before 1.2.1, as used in Winamp before 5.5 and other products, allow user-assisted remote attackers to execute arbitrary code via a malformed FLAC file that triggers improper memory allocation, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 68c46df4dfedb4dfc618cd7476f1b446 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031428" comment="flac-32bit less than 9-200710182357"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033637" comment="flac-32bit less than 9-200710182359"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033638" comment="flac-64bit less than 9-200710190001"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031429" comment="flac-devel less than 1.1.0-387.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033639" comment="flac-x86 less than 9-200710182357"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033640" comment="flac-xmms less than 1.1.0-387.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031430" comment="flac less than 1.1.0-387.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4658</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4658" source="CVE"/>
	<description>
	The money_format function in PHP 5 before 5.2.4, and PHP 4 before 4.4.8, permits multiple (1) %i and (2) %n tokens, which has unknown impact and attack vectors, possibly related to a format string vulnerability.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4661</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4661" source="CVE"/>
	<description>
	The chunk_split function in string.c in PHP 5.2.3 does not properly calculate the needed buffer size due to precision loss when performing integer arithmetic with floating point numbers, which has unknown attack vectors and impact, possibly resulting in a heap-based buffer overflow.  NOTE: this is due to an incomplete fix for CVE-2007-2872.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4752</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4752" source="CVE"/>
	<description>
	ssh in OpenSSH before 4.7 does not properly handle when an untrusted cookie cannot be created and uses a trusted X11 cookie instead, which allows attackers to violate intended policy and gain privileges by causing an X client to be treated as trusted.
	</description>
 </metadata>
<!-- 6b2d209e0f58a6056558133b78463be9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031431" comment="openssh-askpass less than 4.1p1-11.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031432" comment="openssh less than 4.1p1-11.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4769</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4769" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033641" comment="postgresql-libs-32bit less than 9-200801312226"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033642" comment="postgresql-libs-64bit less than 9-200802010511"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033643" comment="postgresql-libs-x86 less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
	<description>
	The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033641" comment="postgresql-libs-32bit less than 9-200801312226"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033642" comment="postgresql-libs-64bit less than 9-200802010511"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033643" comment="postgresql-libs-x86 less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4782</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4782" source="CVE"/>
	<description>
	PHP before 5.2.3 allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the pattern parameter to the glob function; or (2) a long string in the string parameter to the fnmatch function, accompanied by a pattern parameter value with undefined characteristics, as demonstrated by a "*[1]e" value.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4784</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4784" source="CVE"/>
	<description>
	The setlocale function in PHP before 5.2.4 allows context-dependent attackers to cause a denial of service (application crash) via a long string in the locale parameter.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4825</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4825" source="CVE"/>
	<description>
	Directory traversal vulnerability in PHP 5.2.4 and earlier allows attackers to bypass open_basedir restrictions and possibly execute arbitrary code via a .. (dot dot) in the dl function.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4840</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840" source="CVE"/>
	<description>
	PHP 5.2.4 and earlier allows context-dependent attackers to cause a denial of service (application crash) via (1) a long string in the out_charset parameter to the iconv function; or a long string in the charset parameter to the (2) iconv_mime_decode_headers, (3) iconv_mime_decode, or (4) iconv_strlen function.  NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless these issues can be demonstrated for code execution.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4841</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4841" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4879</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879" source="CVE"/>
	<description>
	Mozilla Firefox before Firefox 2.0.0.13, and SeaMonkey before 1.1.9, can automatically install TLS client certificates with minimal user interaction, and automatically sends these certificates when requested, which makes it easier for remote web sites to track user activities across domains by requesting the TLS client certificates from other domains.
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4965</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-4965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4965" source="CVE"/>
	<description>
	Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the tovideo method, and unspecified other vectors related to (2) imageop.c, (3) rbgimgmodule.c, and other files, which trigger heap-based buffer overflows.
	</description>
 </metadata>
<!-- 369e3467aeea8b4a9ba9a6578e9a3e7c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031489" comment="python-32bit less than 9-200801101709"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033645" comment="python-32bit less than 9-200801101710"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033646" comment="python-64bit less than 9-200801101711"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031490" comment="python-curses less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031491" comment="python-demo less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031492" comment="python-devel less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031493" comment="python-doc-pdf less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031494" comment="python-doc less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031495" comment="python-gdbm less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031496" comment="python-idle less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031497" comment="python-mpz less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031498" comment="python-tk less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033647" comment="python-x86 less than 9-200801101709"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031499" comment="python-xml less than 2.3.3-88.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031500" comment="python less than 2.3.3-88.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5000</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c87b234552522821a81df2a63d03f8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033648" comment="apache2-doc less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033649" comment="apache2-example-pages less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
		</criteria>
	</criteria>
	<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033222" comment="apache-doc less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033223" comment="apache-example-pages less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033224" comment="mod_ssl less than 2.8.16-71.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5116</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5116" source="CVE"/>
	<description>
	Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
	</description>
 </metadata>
<!-- ac1366b509057e23230d33e9bad84f43 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031508" comment="perl-32bit less than 9-200711080056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033650" comment="perl-32bit less than 9-200711080236"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033651" comment="perl-64bit less than 9-200711080056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033652" comment="perl-x86 less than 9-200711080056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031509" comment="perl less than 5.8.3-32.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5135</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5135" source="CVE"/>
	<description>
	Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow.  NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.  As of 20071012, it is unknown whether code execution is possible.
	</description>
 </metadata>
<!-- 5ab4f4c02d8fd020226a6cc67e3210f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031510" comment="openssl-32bit less than 9-200710031457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033653" comment="openssl-32bit less than 9-200710031500"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033654" comment="openssl-64bit less than 9-200710031513"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031511" comment="openssl-devel-32bit less than 9-200710031457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033655" comment="openssl-devel-32bit less than 9-200710031500"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033656" comment="openssl-devel-64bit less than 9-200710031513"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031512" comment="openssl-devel less than 0.9.7d-15.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031513" comment="openssl-doc less than 0.9.7d-15.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033657" comment="openssl-x86 less than 9-200710031457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031514" comment="openssl less than 0.9.7d-15.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5137</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5137" source="CVE"/>
	<description>
	Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first.  NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
	</description>
 </metadata>
<!-- 54704d57e08bced85978b78720ac185c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033658" comment="tk-32bit less than 9-200710031441"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031515" comment="tk-32bit less than 9-200710031447"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033659" comment="tk-64bit less than 9-200710031452"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031516" comment="tk-devel less than 8.4.6-41.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033660" comment="tk-x86 less than 9-200710031447"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031517" comment="tk less than 8.4.6-41.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5198</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5198" source="CVE"/>
	<description>
	Buffer overflow in the redir function in check_http.c in Nagios Plugins before 1.4.10, when running with the -f (follow) option, allows remote web servers to execute arbitrary code via Location header responses (redirects) with a large number of leading "L" characters.
	</description>
 </metadata>
<!-- f409f44777806894048f1a26c5422d30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033661" comment="nagios-plugins-extras less than 1.3.1-270.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033662" comment="nagios-plugins less than 1.3.1-270.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5232</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5232" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when applet caching is enabled, allows remote attackers to violate the security model for an applet's outbound connections via a DNS rebinding attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
	<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5236</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5236" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier, on Windows does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read local files via an untrusted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
	<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5237</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5237" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to read and modify local files via an untrusted application, aka "two vulnerabilities."
	</description>
 </metadata>
<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5238</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5238" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_15 and earlier does not properly enforce access restrictions for untrusted applications, which allows user-assisted remote attackers to obtain sensitive information (the Java Web Start cache location) via an untrusted application, aka "three vulnerabilities."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
	<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5239</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5239" source="CVE"/>
	<description>
	Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier does not properly enforce access restrictions for untrusted (1) applications and (2) applets, which allows user-assisted remote attackers to copy or rename arbitrary files when local users perform drag-and-drop operations from the untrusted application or applet window onto certain types of desktop applications.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
	<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5240</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240" source="CVE"/>
	<description>
	Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34ff626d99ce5b395d23381dd99d55fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033665" comment="IBMJava2-JRE less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033666" comment="IBMJava2-JRE less than 1.4.2-0.123"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033667" comment="IBMJava2-SDK less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033668" comment="IBMJava2-SDK less than 1.4.2-0.123"/>
		</criteria>
	</criteria>
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
	<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5269</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5269" source="CVE"/>
	<description>
	Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations.
	</description>
 </metadata>
<!-- 56605be2584d53da1a8232f1bf454759 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033669" comment="libpng-32bit less than 9-200711060113"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031520" comment="libpng-32bit less than 9-200711060115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033670" comment="libpng-64bit less than 9-200711060514"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031521" comment="libpng-devel less than 1.2.5-182.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033671" comment="libpng-x86 less than 9-200711060115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031522" comment="libpng less than 1.2.5-182.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5273</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5273" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when an HTTP proxy server is used, allows remote attackers to violate the security model for an applet's outbound connections via a multi-pin DNS rebinding attack in which the applet download relies on DNS resolution on the proxy server, but the applet's socket operations rely on DNS resolution on the local machine, a different issue than CVE-2007-5274. NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
	<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5274</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5274" source="CVE"/>
	<description>
	Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier, when Firefox or Opera is used, allows remote attackers to violate the security model for JavaScript outbound connections via a multi-pin DNS rebinding attack dependent on the LiveConnect API, in which JavaScript download relies on DNS resolution by the browser, but JavaScript socket operations rely on separate DNS resolution by a Java Virtual Machine (JVM), a different issue than CVE-2007-5273.  NOTE: this is similar to CVE-2007-5232.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 9a5ab06f4b454def4dc88e7b2a5b241b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033597" comment="IBMJava5-JRE less than 1.5.0-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033598" comment="IBMJava5-SDK less than 1.5.0-0.15"/>
		</criteria>
	</criteria>
	<!-- 9d8cb03291c8cdf9cfec381e38bd6b88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031518" comment="java2-jre less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033663" comment="java2-jre less than 1.4.2-129.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031519" comment="java2 less than 1.4.2-129.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033664" comment="java2 less than 1.4.2-129.33"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5333</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5333" source="CVE"/>
	<description>
	Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
	</description>
 </metadata>
<!-- 9ad93d9cf0cbff51419c9761a5fc4cdd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033477" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033478" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033479" comment="jakarta-tomcat-doc less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033480" comment="jakarta-tomcat-examples less than 5.0.19-29.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031252" comment="jakarta-tomcat less than 5.0.19-29.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5334</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5334" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 can hide the window's titlebar when displaying XUL markup language documents, which makes it easier for remote attackers to conduct phishing and spoofing attacks by setting the hidechrome attribute.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5337</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5337" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5, when running on Linux systems with gnome-vfs support, might allow remote attackers to read arbitrary files on SSH/sftp servers that accept key authentication by creating a web page on the target server, in which the web page contains URIs with (1) smb: or (2) sftp: schemes that access other files from the server.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5338</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5338" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.8 and SeaMonkey before 1.1.5 allow remote attackers to execute arbitrary Javascript with user privileges by using the Script object to modify XPCNativeWrappers in a way that causes the script to be executed when a chrome action is performed.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5339</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5339" source="CVE"/>
	<description>
	Multiple vulnerabilities in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption or assert errors.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5340</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5340" source="CVE"/>
	<description>
	Multiple vulnerabilities in the Javascript engine in Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allow remote attackers to cause a denial of service (crash) via crafted HTML that triggers memory corruption.
	</description>
 </metadata>
<!-- bc8dbb4aea45ba7fac544f7e63f7898b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033160" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030842" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030843" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030844" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030845" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030846" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030847" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030849" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030850" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030851" comment="mozilla less than 1.8_seamonkey_1.0.9-1.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5392</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5392" source="CVE"/>
	<description>
	Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a crafted PDF file, resulting in a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f83e024a65d69ebc810d2117815b940d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031402" comment="cups-client less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031403" comment="cups-devel less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031404" comment="cups-libs-32bit less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033626" comment="cups-libs-32bit less than 9-200711080705"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033627" comment="cups-libs-64bit less than 9-200711080640"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033628" comment="cups-libs-x86 less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031405" comment="cups-libs less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031406" comment="cups less than 1.1.20-108.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5393</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5393" source="CVE"/>
	<description>
	Heap-based buffer overflow in the CCITTFaxStream::lookChar method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arbitrary code via a PDF file that contains a crafted CCITTFaxDecode filter.
	</description>
 </metadata>
<!-- f83e024a65d69ebc810d2117815b940d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031402" comment="cups-client less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031403" comment="cups-devel less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031404" comment="cups-libs-32bit less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033626" comment="cups-libs-32bit less than 9-200711080705"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033627" comment="cups-libs-64bit less than 9-200711080640"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033628" comment="cups-libs-x86 less than 9-200711080439"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031405" comment="cups-libs less than 1.1.20-108.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031406" comment="cups less than 1.1.20-108.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5398</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398" source="CVE"/>
	<description>
	Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
	</description>
 </metadata>
<!-- a8a615405c62005f443b3e34d922d381 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033632" comment="libsmbclient-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031415" comment="libsmbclient-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033633" comment="libsmbclient-64bit less than 9-200711240034"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031416" comment="libsmbclient-devel less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031417" comment="libsmbclient less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033634" comment="samba-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031418" comment="samba-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033635" comment="samba-client-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031419" comment="samba-client-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031420" comment="samba-client less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031421" comment="samba-doc less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031422" comment="samba-pdb less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031423" comment="samba-python less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031424" comment="samba-vscan less than 0.3.6b-0.26.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033636" comment="samba-winbind-32bit less than 9-200711231828"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031425" comment="samba-winbind-32bit less than 9-200711231829"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031426" comment="samba-winbind less than 3.0.20b-3.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031427" comment="samba less than 3.0.20b-3.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5461</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5461" source="CVE"/>
	<description>
	Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032896" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032897" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032898" comment="jakarta-tomcat-doc less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032899" comment="jakarta-tomcat-examples less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5497</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5497" source="CVE"/>
	<description>
	Multiple integer overflows in libext2fs in e2fsprogs before 1.40.3 allow user-assisted remote attackers to execute arbitrary code via a crafted filesystem image.
	</description>
 </metadata>
<!-- 6dd778b3f47ea6338ca94dac88abee05 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033672" comment="e2fsprogs-32bit less than 9-200711231615"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031524" comment="e2fsprogs-32bit less than 9-200711231622"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033673" comment="e2fsprogs-64bit less than 9-200711231617"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033674" comment="e2fsprogs-devel-32bit less than 9-200711231615"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031525" comment="e2fsprogs-devel-32bit less than 9-200711231622"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033675" comment="e2fsprogs-devel-64bit less than 9-200711231617"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031526" comment="e2fsprogs-devel less than 1.38-4.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033676" comment="e2fsprogs-x86 less than 9-200711231622"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031527" comment="e2fsprogs less than 1.38-4.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5623</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5623" source="CVE"/>
	<description>
	Buffer overflow in the check_snmp function in Nagios Plugins (nagios-plugins) 1.4.10 allows remote attackers to cause a denial of service (crash) via crafted snmpget replies.
	</description>
 </metadata>
<!-- f409f44777806894048f1a26c5422d30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033661" comment="nagios-plugins-extras less than 1.3.1-270.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033662" comment="nagios-plugins less than 1.3.1-270.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5760</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5760" source="CVE"/>
	<description>
	Array index error in the XFree86-Misc extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via a PassMessage request containing a large array index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033677" comment="XFree86-libs-64bit less than 9-200801062030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033678" comment="XFree86-libs-x86 less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5794</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5794" source="CVE"/>
	<description>
	Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call to nss_ldap, might send user data to the wrong process because of improper handling of the LDAP connection. NOTE: this issue was originally reported for Dovecot with the wrong mailboxes being returned, but other applications might also be affected.
	</description>
 </metadata>
<!-- 5a8d0489cebefa2727391109050a24c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033679" comment="nss_ldap-32bit less than 9-200712041545"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031533" comment="nss_ldap-32bit less than 9-200712041546"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033680" comment="nss_ldap-64bit less than 9-200712041544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033681" comment="nss_ldap-x86 less than 9-200712041546"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031534" comment="nss_ldap less than 215-59.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5846</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5846" source="CVE"/>
	<description>
	The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value.
	</description>
 </metadata>
<!-- c71f28d1fb2ec0c2488da36c8a98a507 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033682" comment="net-snmp-32bit less than 9-200711271522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031535" comment="net-snmp-devel less than 5.1.3.1-0.17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031536" comment="net-snmp less than 5.1.3.1-0.17.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031537" comment="perl-SNMP less than 5.1.3.1-0.17.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5848" source="CVE"/>
	<description>
	Buffer overflow in CUPS in Apple Mac OS X 10.4.11 allows local admin users to execute arbitrary code via a crafted URI to the CUPS service.
	</description>
 </metadata>
<!-- eb37a23ce60ab91ec04f08ea1e3aa56a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031538" comment="cups-client less than 1.1.20-108.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031539" comment="cups-devel less than 1.1.20-108.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033683" comment="cups-libs-32bit less than 9-200712111650"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031540" comment="cups-libs-32bit less than 9-200712111651"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033684" comment="cups-libs-64bit less than 9-200712111655"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033685" comment="cups-libs-x86 less than 9-200712111651"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031541" comment="cups-libs less than 1.1.20-108.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031542" comment="cups less than 1.1.20-108.46"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5898</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5898" source="CVE"/>
	<description>
	The (1) htmlentities and (2) htmlspecialchars functions in PHP before 5.2.5 accept partial multibyte sequences, which has unknown impact and attack vectors, a different issue than CVE-2006-5465.
	</description>
 </metadata>
<!-- f1255e10262bd8b24adcb137ab61417e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033320" comment="apache-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033321" comment="apache2-mod_php4 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033322" comment="mod_php4-apache2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031048" comment="mod_php4-core less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033323" comment="mod_php4-servlet less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031049" comment="php4-bcmath less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031050" comment="php4-bz2 less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031051" comment="php4-calendar less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031052" comment="php4-ctype less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031053" comment="php4-curl less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031054" comment="php4-dba less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031055" comment="php4-dbase less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031056" comment="php4-devel less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031057" comment="php4-domxml less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031058" comment="php4-exif less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031059" comment="php4-fastcgi less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031060" comment="php4-filepro less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031061" comment="php4-ftp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031062" comment="php4-gd less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031063" comment="php4-gettext less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031064" comment="php4-gmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031065" comment="php4-iconv less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031066" comment="php4-imap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031067" comment="php4-ldap less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031068" comment="php4-mbstring less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031069" comment="php4-mcal less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031070" comment="php4-mcrypt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031071" comment="php4-mhash less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031072" comment="php4-mime_magic less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031073" comment="php4-mysql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031074" comment="php4-pear less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031075" comment="php4-pgsql less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031076" comment="php4-qtdom less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031077" comment="php4-readline less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031078" comment="php4-recode less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031080" comment="php4-session less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031081" comment="php4-shmop less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031082" comment="php4-snmp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031083" comment="php4-sockets less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031084" comment="php4-swf less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031085" comment="php4-sysvsem less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031086" comment="php4-sysvshm less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031087" comment="php4-unixODBC less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031088" comment="php4-wddx less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031089" comment="php4-xslt less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031090" comment="php4-yp less than 4.3.4-43.85"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031091" comment="php4-zlib less than 4.3.4-43.85"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5904</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5904" source="CVE"/>
	<description>
	Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e880b69d2507563c8d20082866b36d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033600" comment="kernel-64k-pagesize less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033602" comment="kernel-sn2 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 11f2685248dd1c55897b82c840b7d545 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033603" comment="kernel-s390-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033604" comment="kernel-s390 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 436375e56cfcb119e5e42c29cf234297 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 6e07221ab94b5e49d7d361fb01b8e5ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033606" comment="kernel-iseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033607" comment="kernel-pmac64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033608" comment="kernel-pseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 7494a86d66f662e33c4a4a005ae22828 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033609" comment="kernel-s390x-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033610" comment="kernel-s390x less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- ecea9bb7c95d1d842c67c822088572c9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033611" comment="kernel-um less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033612" comment="kernel-xenpae less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033613" comment="um-host-install-initrd less than 1.0-48.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033614" comment="um-host-kernel less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5925</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5925" source="CVE"/>
	<description>
	The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5939</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5939" source="CVE"/>
	<description>
	The gss_userok function in appl/ftp/ftpd/gss_userok.c in Heimdal 0.7.2 does not allocate memory for the ticketfile pointer before calling free, which allows remote attackers to have an unknown impact via an invalid username.  NOTE: the vulnerability was originally reported for ftpd.c, but this is incorrect.
	</description>
 </metadata>
<!-- f61794701df3f762046f48a83269b763 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033686" comment="heimdal-devel-32bit less than 9-200712111656"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031556" comment="heimdal-devel-32bit less than 9-200712111659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033687" comment="heimdal-devel-64bit less than 9-200712111705"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031557" comment="heimdal-devel less than 0.6.1rc3-55.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033688" comment="heimdal-lib-32bit less than 9-200712111656"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031558" comment="heimdal-lib-32bit less than 9-200712111659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033689" comment="heimdal-lib-64bit less than 9-200712111705"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033690" comment="heimdal-lib-x86 less than 9-200712111659"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031559" comment="heimdal-lib less than 0.6.1rc3-55.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031560" comment="heimdal-tools less than 0.6.1rc3-55.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031561" comment="heimdal less than 0.6.1rc3-55.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5947</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5947" source="CVE"/>
	<description>
	The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
	</description>
 </metadata>
<!-- cdc4a6a740cfce018bc8945da9156808 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033691" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031562" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031563" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031564" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031565" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031566" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031567" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031569" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031570" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031571" comment="mozilla less than 1.8_seamonkey_1.0.9-1.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5958</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5958" source="CVE"/>
	<description>
	X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033677" comment="XFree86-libs-64bit less than 9-200801062030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033678" comment="XFree86-libs-x86 less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5959</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5959" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors that trigger memory corruption.
	</description>
 </metadata>
<!-- cdc4a6a740cfce018bc8945da9156808 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033691" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031562" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031563" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031564" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031565" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031566" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031567" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031569" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031570" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031571" comment="mozilla less than 1.8_seamonkey_1.0.9-1.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5960</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5960" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.
	</description>
 </metadata>
<!-- cdc4a6a740cfce018bc8945da9156808 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033691" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031562" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031563" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031564" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031565" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031566" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031567" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031569" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031570" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031571" comment="mozilla less than 1.8_seamonkey_1.0.9-1.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5969</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5969" source="CVE"/>
	<description>
	MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6015</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6015" source="CVE"/>
	<description>
	Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
	</description>
 </metadata>
<!-- 62b9c0440dd934e47058664687d5b084 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033692" comment="libsmbclient-32bit less than 9-200712041729"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031575" comment="libsmbclient-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033693" comment="libsmbclient-64bit less than 9-200712041730"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031576" comment="libsmbclient-devel less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031577" comment="libsmbclient less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033694" comment="samba-32bit less than 9-200712041729"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031578" comment="samba-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033695" comment="samba-client-32bit less than 9-200712041729"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031579" comment="samba-client-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031580" comment="samba-client less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031581" comment="samba-doc less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031582" comment="samba-pdb less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031583" comment="samba-python less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031584" comment="samba-vscan less than 0.3.6b-0.26.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033696" comment="samba-winbind-32bit less than 9-200712041729"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031585" comment="samba-winbind-32bit less than 9-200712041731"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031586" comment="samba-winbind less than 3.0.20b-3.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031587" comment="samba less than 3.0.20b-3.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6067</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6067" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033641" comment="postgresql-libs-32bit less than 9-200801312226"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033642" comment="postgresql-libs-64bit less than 9-200802010511"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033643" comment="postgresql-libs-x86 less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6111</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6111" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6112</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6112" source="CVE"/>
	<description>
	Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6113</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6113" source="CVE"/>
	<description>
	Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attackers to cause a denial of service (long loop) via a malformed DNP3 packet.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6114</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6114" source="CVE"/>
	<description>
	Multiple buffer overflows in Wireshark (formerly Ethereal) 0.99.0 through 0.99.6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) the SSL dissector or (2) the iSeries (OS/400) Communication trace file parser.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6115</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6115" source="CVE"/>
	<description>
	Buffer overflow in the ANSI MAP dissector for Wireshark (formerly Ethereal) 0.99.5 to 0.99.6, when running on unspecified platforms, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6116</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6116" source="CVE"/>
	<description>
	The Firebird/Interbase dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite loop or crash) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6117</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6117" source="CVE"/>
	<description>
	Unspecified vulnerability in the HTTP dissector for Wireshark (formerly Ethereal) 0.10.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted chunked messages.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6118</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6118" source="CVE"/>
	<description>
	The MEGACO dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6119</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6119" source="CVE"/>
	<description>
	The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (long loop and resource consumption) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6120</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6120" source="CVE"/>
	<description>
	The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6121</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6121" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6151</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6151" source="CVE"/>
	<description>
	The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e880b69d2507563c8d20082866b36d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033600" comment="kernel-64k-pagesize less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033602" comment="kernel-sn2 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 11f2685248dd1c55897b82c840b7d545 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033603" comment="kernel-s390-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033604" comment="kernel-s390 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 436375e56cfcb119e5e42c29cf234297 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 6e07221ab94b5e49d7d361fb01b8e5ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033606" comment="kernel-iseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033607" comment="kernel-pmac64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033608" comment="kernel-pseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 7494a86d66f662e33c4a4a005ae22828 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033609" comment="kernel-s390x-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033610" comment="kernel-s390x less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- ecea9bb7c95d1d842c67c822088572c9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033611" comment="kernel-um less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033612" comment="kernel-xenpae less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033613" comment="um-host-install-initrd less than 1.0-48.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033614" comment="um-host-kernel less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6167</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6167" source="CVE"/>
	<description>
	Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
	</description>
 </metadata>
<!-- b2b5779b3105842f8b7ea5b6992883ad -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031589" comment="yast2-core-devel less than 2.9.98.1-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031590" comment="yast2-core less than 2.9.98.1-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6199</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6199" source="CVE"/>
	<description>
	rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy.
	</description>
 </metadata>
<!-- 8b7ab8a915e5a096afe4ffa851d5be91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031591" comment="rsync less than 2.6.8-53.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6200</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6200" source="CVE"/>
	<description>
	Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.
	</description>
 </metadata>
<!-- 8b7ab8a915e5a096afe4ffa851d5be91 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031591" comment="rsync less than 2.6.8-53.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6203</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203" source="CVE"/>
	<description>
	Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
	</description>
 </metadata>
<!-- 2c87b234552522821a81df2a63d03f8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033648" comment="apache2-doc less than 2.0.59-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033649" comment="apache2-example-pages less than 2.0.59-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6206</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6206" source="CVE"/>
	<description>
	The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6239</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6239" source="CVE"/>
	<description>
	The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.
	</description>
 </metadata>
<!-- e6d3d86875c99ac49052ced4199bd6d1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033697" comment="squid less than 2.5.STABLE5-42.52"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6282</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6282" source="CVE"/>
	<description>
	The IPsec implementation in Linux kernel before 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e03d5b97d06e1b13d14d5cdd961584 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033698" comment="kernel-s390-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033699" comment="kernel-s390 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 2ce8206e75a69d956cffa543e36de355 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033700" comment="kernel-s390x-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033701" comment="kernel-s390x less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 579ba4eeb5ca56dd5d0862061000e9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033703" comment="kernel-um less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033705" comment="kernel-xenpae less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033706" comment="um-host-install-initrd less than 1.0-48.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033707" comment="um-host-kernel less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 741a70086940bf89a19a5a484413c337 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 7f769b899bab51d771d99e5617baee00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033708" comment="kernel-64k-pagesize less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033709" comment="kernel-sn2 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 905ed62c59aa08ffca4e5a0d1e784e17 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033710" comment="kernel-iseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033711" comment="kernel-pmac64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033712" comment="kernel-pseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6284</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6284" source="CVE"/>
	<description>
	The xmlCurrentChar function in libxml2 before 2.6.31 allows context-dependent attackers to cause a denial of service (infinite loop) via XML containing invalid UTF-8 sequences.
	</description>
 </metadata>
<!-- f9364893382df399b6831f0d5db6e063 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033713" comment="libxml2-32bit less than 9-200712191219"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031597" comment="libxml2-32bit less than 9-200712191220"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033714" comment="libxml2-64bit less than 9-200712191222"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031598" comment="libxml2-devel less than 2.6.7-28.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033715" comment="libxml2-x86 less than 9-200712191220"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031600" comment="libxml2 less than 2.6.7-28.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6303</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6303" source="CVE"/>
	<description>
	MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6304</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6304" source="CVE"/>
	<description>
	The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
	</description>
 </metadata>
<!-- 7cb80eb2033195041bfb93aa6b99a517 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031290" comment="mysql-Max less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031292" comment="mysql-client less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031293" comment="mysql-devel less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031294" comment="mysql-shared less than 4.0.18-32.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031295" comment="mysql less than 4.0.18-32.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6335</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6335" source="CVE"/>
	<description>
	Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 59fa3ccafba43c29dc8e9a17f463a213 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6336</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6336" source="CVE"/>
	<description>
	Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.
	</description>
 </metadata>
<!-- 59fa3ccafba43c29dc8e9a17f463a213 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6337</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6337" source="CVE"/>
	<description>
	Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.
	</description>
 </metadata>
<!-- 59fa3ccafba43c29dc8e9a17f463a213 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033716" comment="clamav less than 0.92-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6351</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6351" source="CVE"/>
	<description>
	libexif 0.6.16 and earlier allows context-dependent attackers to cause a denial of service (infinite recursion) via an image file with crafted EXIF tags, possibly involving the exif_loader_write function in exif_loader.c.
	</description>
 </metadata>
<!-- 23b2b9b4c711d113313d3391e1ccaf7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031602" comment="libexif less than 0.5.12-118.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6352</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6352" source="CVE"/>
	<description>
	Integer overflow in libexif 0.6.16 and earlier allows context-dependent attackers to execute arbitrary code via an image with crafted EXIF tags, possibly involving the exif_data_load_data_thumbnail function in exif-data.c.
	</description>
 </metadata>
<!-- 23b2b9b4c711d113313d3391e1ccaf7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031602" comment="libexif less than 0.5.12-118.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6388</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c87b234552522821a81df2a63d03f8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033648" comment="apache2-doc less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033649" comment="apache2-example-pages less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
		</criteria>
	</criteria>
	<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033222" comment="apache-doc less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033223" comment="apache-example-pages less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033224" comment="mod_ssl less than 2.8.16-71.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6427</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6427" source="CVE"/>
	<description>
	The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033677" comment="XFree86-libs-64bit less than 9-200801062030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033678" comment="XFree86-libs-x86 less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6428</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6428" source="CVE"/>
	<description>
	The ProcGetReservedColormapEntries function in the TOG-CUP extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to read the contents of arbitrary memory locations via a request containing a 32-bit value that is improperly used as an array index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033677" comment="XFree86-libs-64bit less than 9-200801062030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033678" comment="XFree86-libs-x86 less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6429</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6429" source="CVE"/>
	<description>
	Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033677" comment="XFree86-libs-64bit less than 9-200801062030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033678" comment="XFree86-libs-x86 less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6438</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6438" source="CVE"/>
	<description>
	Unspecified vulnerability in the SMB dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service via unknown vectors.  NOTE: this identifier originally included MP3 and NCP, but those issues are already covered by CVE-2007-6111.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6439</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6439" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (infinite or large loop) via the (1) IPv6 or (2) USB dissector, which can trigger resource consumption or a crash. NOTE: this identifier originally included Firebird/Interbase, but it is already covered by CVE-2007-6116.  The DCP ETSI issue is already covered by CVE-2007-6119.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6441</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6441" source="CVE"/>
	<description>
	The WiMAX dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors related to "unaligned access on some platforms."
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6450</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6450" source="CVE"/>
	<description>
	The RPL dissector in Wireshark (formerly Ethereal) 0.9.8 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6451</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6451" source="CVE"/>
	<description>
	Unspecified vulnerability in the CIP dissector in Wireshark (formerly Ethereal) 0.9.14 to 0.99.6 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger allocation of large amounts of memory.
	</description>
 </metadata>
<!-- aab8a806c000656fefc91ad0e08dc893 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031588" comment="ethereal less than 0.10.13-2.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6595</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6595" source="CVE"/>
	<description>
	ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6596</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6596" source="CVE"/>
	<description>
	ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
	<description>
	PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033641" comment="postgresql-libs-32bit less than 9-200801312226"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033642" comment="postgresql-libs-64bit less than 9-200802010511"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033643" comment="postgresql-libs-x86 less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6601</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6601" source="CVE"/>
	<description>
	The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21, when local trust or ident authentication is used, allows remote attackers to gain privileges via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2007-3278.
	</description>
 </metadata>
<!-- b923c74e6ff969e6dca94231c2d4e667 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031433" comment="postgresql-contrib less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031434" comment="postgresql-devel less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031435" comment="postgresql-docs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031436" comment="postgresql-libs-32bit less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033641" comment="postgresql-libs-32bit less than 9-200801312226"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033642" comment="postgresql-libs-64bit less than 9-200802010511"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033643" comment="postgresql-libs-x86 less than 9-200801312100"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031437" comment="postgresql-libs less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031438" comment="postgresql-pl less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031439" comment="postgresql-server less than 7.4.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031440" comment="postgresql less than 7.4.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6698</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6698" source="CVE"/>
	<description>
	The BDB backend for slapd in OpenLDAP before 2.3.36 allows remote authenticated users to cause a denial of service (crash) via a potentially-successful modify operation with the NOOP control set to critical, possibly due to a double free vulnerability.
	</description>
 </metadata>
<!-- db61a2ae569744603c72552a38a58c12 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031603" comment="openldap2-back-ldap less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031604" comment="openldap2-back-meta less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031605" comment="openldap2-back-monitor less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031606" comment="openldap2-back-perl less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031607" comment="openldap2-client-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033718" comment="openldap2-client-64bit less than 9-200802110139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033719" comment="openldap2-client-x86 less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031608" comment="openldap2-client less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031609" comment="openldap2-devel-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033720" comment="openldap2-devel-64bit less than 9-200802110139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031610" comment="openldap2-devel less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031611" comment="openldap2 less than 2.2.24-4.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6716</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716" source="CVE"/>
	<description>
	fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16461d7e407e4950ee4e06104be3486e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033721" comment="kernel-64k-pagesize less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033723" comment="kernel-sn2 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 2727447879f3a66b9e835ba69837a927 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033724" comment="kernel-s390-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033725" comment="kernel-s390 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 656a568516f192405b568d6fb399712b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033726" comment="kernel-s390x-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033727" comment="kernel-s390x less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 8980e701b12ad4f9c86c7fe931d87bd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- a7de9a18ad854efa026811d679868b52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033729" comment="kernel-iseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033730" comment="kernel-pmac64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033731" comment="kernel-pseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- cbbe741f8b8b2844954325c7b19640e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033732" comment="kernel-um less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033733" comment="kernel-xenpae less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033734" comment="um-host-install-initrd less than 1.0-48.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033735" comment="um-host-kernel less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6720</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720" source="CVE"/>
	<description>
	libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
	</description>
 </metadata>
<!-- 639b367ae0bb9c20f36d43ad4161177e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033736" comment="libmikmod-32bit less than 9-200902271552"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031617" comment="libmikmod-32bit less than 9-200902271558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033737" comment="libmikmod-64bit less than 9-200902280719"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033738" comment="libmikmod-x86 less than 9-200902271558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031618" comment="libmikmod less than 3.1.10-662.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6725</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725" source="CVE"/>
	<description>
	The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
	</description>
 </metadata>
<!-- c6678e67cf231f1f6438ecd15943042f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031619" comment="ghostscript-fonts-other less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031620" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031621" comment="ghostscript-fonts-std less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031622" comment="ghostscript-library less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031623" comment="ghostscript-serv less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031624" comment="ghostscript-x11 less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031625" comment="libgimpprint-devel less than 4.2.6-46.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031626" comment="libgimpprint less than 4.2.6-46.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6733</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6733" source="CVE"/>
	<description>
	The nfs_lock function in fs/nfs/file.c in the Linux kernel 2.6.9 does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on an NFS filesystem and then changing this file's permissions, a related issue to CVE-2010-0727.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0005</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005" source="CVE"/>
	<description>
	mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c87b234552522821a81df2a63d03f8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031504" comment="apache2-devel less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033648" comment="apache2-doc less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033649" comment="apache2-example-pages less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031505" comment="apache2-prefork less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031506" comment="apache2-worker less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031507" comment="apache2 less than 2.0.59-1.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031503" comment="libapr0 less than 2.0.59-1.8"/>
		</criteria>
	</criteria>
	<!-- 484f33da03a9e3e4632f40254c4a96a3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009030903" comment="apache-devel less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033222" comment="apache-doc less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033223" comment="apache-example-pages less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009030904" comment="apache less than 1.3.29-71.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033224" comment="mod_ssl less than 2.8.16-71.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0006</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0006" source="CVE"/>
	<description>
	Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56240f6955337ddf455d2aa23797006a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031528" comment="XFree86-libs-32bit less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033677" comment="XFree86-libs-64bit less than 9-200801062030"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033678" comment="XFree86-libs-x86 less than 9-200801062003"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031529" comment="XFree86-libs less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031530" comment="XFree86-server less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
	<!-- 686ed843d1dc7672badd026d1d0712c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031531" comment="XFree86-Xnest less than 4.3.99.902-43.94"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031532" comment="XFree86-Xvfb less than 4.3.99.902-43.94"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0007</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0007" source="CVE"/>
	<description>
	Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e880b69d2507563c8d20082866b36d9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033600" comment="kernel-64k-pagesize less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033602" comment="kernel-sn2 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 11f2685248dd1c55897b82c840b7d545 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033603" comment="kernel-s390-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033604" comment="kernel-s390 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 436375e56cfcb119e5e42c29cf234297 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 6e07221ab94b5e49d7d361fb01b8e5ef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033606" comment="kernel-iseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033607" comment="kernel-pmac64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033608" comment="kernel-pseries64 less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- 7494a86d66f662e33c4a4a005ae22828 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033609" comment="kernel-s390x-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033610" comment="kernel-s390x less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
	<!-- ecea9bb7c95d1d842c67c822088572c9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031377" comment="kernel-bigsmp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033601" comment="kernel-debug less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031378" comment="kernel-default less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031379" comment="kernel-smp less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031380" comment="kernel-source less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031381" comment="kernel-syms less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033611" comment="kernel-um less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033605" comment="kernel-xen less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033612" comment="kernel-xenpae less than 2.6.5-7.311"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033613" comment="um-host-install-initrd less than 1.0-48.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033614" comment="um-host-kernel less than 2.6.5-7.311"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0016</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0016" source="CVE"/>
	<description>
	Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0017</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017" source="CVE"/>
	<description>
	The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0053</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053" source="CVE"/>
	<description>
	Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
	</description>
 </metadata>
<!-- b8c1c10ee3584bcc23b201ff91e9ce95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031655" comment="cups-client less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031656" comment="cups-devel less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031657" comment="cups-libs-32bit less than 9-200803201838"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033741" comment="cups-libs-32bit less than 9-200803201848"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033742" comment="cups-libs-64bit less than 9-200803210144"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033743" comment="cups-libs-x86 less than 9-200803201838"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031658" comment="cups-libs less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031659" comment="cups less than 1.1.20-108.50"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0122</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122" source="CVE"/>
	<description>
	Off-by-one error in the inet_network function in libbind in ISC BIND 9.4.2 and earlier, as used in libc in FreeBSD 6.2 through 7.0-PRERELEASE, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted input that triggers memory corruption.
	</description>
 </metadata>
<!-- 7afe858ccb0103a56cad145635e13ece -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031668" comment="bind-devel less than 9.3.4-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031669" comment="bind-utils-32bit less than 9-200801211531"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033744" comment="bind-utils-32bit less than 9-200801211534"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033745" comment="bind-utils-64bit less than 9-200801211546"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033746" comment="bind-utils-x86 less than 9-200801211531"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031670" comment="bind-utils less than 9.3.4-4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031671" comment="bind less than 9.3.4-4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0128</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0128" source="CVE"/>
	<description>
	The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
	</description>
 </metadata>
<!-- 315ff7a101fca9aabbfab11879f31212 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032896" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032897" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032898" comment="jakarta-tomcat-doc less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032899" comment="jakarta-tomcat-examples less than 5.0.19-29.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009030636" comment="jakarta-tomcat less than 5.0.19-29.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0314</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0314" source="CVE"/>
	<description>
	Heap-based buffer overflow in spin.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted PeSpin packed PE binary with a modified length value.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0318</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0318" source="CVE"/>
	<description>
	Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 512985d2cd3090bfb93dcb7b551179cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033747" comment="clamav less than 0.92.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0411</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0411" source="CVE"/>
	<description>
	Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
	</description>
 </metadata>
<!-- 9c324f30fcb2a47560860b00be29ea05 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031677" comment="ghostscript-fonts-other less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031678" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031679" comment="ghostscript-fonts-std less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031680" comment="ghostscript-library less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031681" comment="ghostscript-serv less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031682" comment="ghostscript-x11 less than 7.07.1rc1-195.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031683" comment="libgimpprint-devel less than 4.2.6-46.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031684" comment="libgimpprint less than 4.2.6-46.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0412</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to the (1) nsTableFrame::GetFrameAtOrBefore, (2) nsAccessibilityService::GetAccessible, (3) nsBindingManager::GetNestedInsertionPoint, (4) nsXBLPrototypeBinding::AttributeChanged, (5) nsColumnSetFrame::GetContentInsertionFrame, and (6) nsLineLayout::TrimTrailingWhiteSpaceIn methods, and other vectors.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0413</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via (1) a large switch statement, (2) certain uses of watch and eval, (3) certain uses of the mousedown event listener, and other vectors.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0414</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to trick the user into uploading arbitrary files via label tags that shift focus to a file input field, aka "focus spoofing."
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0415</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8 allows remote attackers to execute script outside of the sandbox and conduct cross-site scripting (XSS) attacks via multiple vectors including the XMLDocument.load function, aka "JavaScript privilege escalation bugs."
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0417</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417" source="CVE"/>
	<description>
	CRLF injection vulnerability in Mozilla Firefox before 2.0.0.12 allows remote user-assisted web sites to corrupt the user's password store via newlines that are not properly handled when the user saves a password.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0418</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before 1.1.8, when using "flat" addons, allows remote attackers to read arbitrary Javascript, image, and stylesheet files via the chrome: URI scheme, as demonstrated by stealing session information from sessionstore.js.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0419</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows remote attackers to steal navigation history and cause a denial of service (crash) via images in a page that uses designMode frames, which triggers memory corruption related to resize handles.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0553</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- 4546b749458249bfe384e07a8f465fe5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031697" comment="tk-32bit less than 9-200802060128"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033749" comment="tk-64bit less than 9-200802060127"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031698" comment="tk-devel less than 8.4.6-41.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033750" comment="tk-x86 less than 9-200802060128"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031699" comment="tk less than 8.4.6-41.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0554</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0554" source="CVE"/>
	<description>
	Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- b90f1d07d8dbf00ef6e210e9e4b58cf8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031700" comment="libnetpbm less than 1.0.0-618.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031701" comment="netpbm less than 10.11.4-172.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0564</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0564" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636.
	</description>
 </metadata>
<!-- 26600278f6138b5e42cfe92fd0ee2777 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031702" comment="mailman less than 2.1.4-83.30"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0591</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and Thunderbird before 2.0.0.12 does not properly manage a delay timer used in confirmation dialogs, which might allow remote attackers to trick users into confirming an unsafe action, such as remote file execution, by using a timer to change the window focus, aka the "dialog refocus bug" or "ffclick2".
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0592</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8 allows user-assisted remote attackers to cause a denial of service via a plain .txt file with a "Content-Disposition: attachment" and an invalid "Content-Type: plain/text," which prevents Firefox from rendering future plain text files within the browser.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0593</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593" source="CVE"/>
	<description>
	Gecko-based browsers, including Mozilla Firefox before 2.0.0.12 and SeaMonkey before 1.1.8, modify the .href property of stylesheet DOM nodes to the final URI of a 302 redirect, which might allow remote attackers to bypass the Same Origin Policy and read sensitive information from the original URL, such as with Single-Signon systems.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0594</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.12 does not always display a web forgery warning dialog if the entire contents of a web page are in a DIV tag that uses absolute positioning, which makes it easier for remote attackers to conduct phishing attacks.
	</description>
 </metadata>
<!-- 5cfea67de8b82bf442ad7c4663356e99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033748" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031687" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031688" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031689" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031691" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031692" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031694" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031695" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031696" comment="mozilla less than 1.8_seamonkey_1.0.9-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0596</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0596" source="CVE"/>
	<description>
	Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.
	</description>
 </metadata>
<!-- 1addc7e3aa69e266f0fba3fdfef8b6c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031703" comment="cups-client less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031704" comment="cups-devel less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031705" comment="cups-libs-32bit less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033751" comment="cups-libs-32bit less than 9-200803040018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033752" comment="cups-libs-64bit less than 9-200803040013"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033753" comment="cups-libs-x86 less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031706" comment="cups-libs less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031707" comment="cups less than 1.1.20-108.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0597</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0597" source="CVE"/>
	<description>
	Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.
	</description>
 </metadata>
<!-- 1addc7e3aa69e266f0fba3fdfef8b6c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031703" comment="cups-client less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031704" comment="cups-devel less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031705" comment="cups-libs-32bit less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033751" comment="cups-libs-32bit less than 9-200803040018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033752" comment="cups-libs-64bit less than 9-200803040013"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033753" comment="cups-libs-x86 less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031706" comment="cups-libs less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031707" comment="cups less than 1.1.20-108.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0598</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598" source="CVE"/>
	<description>
	Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16461d7e407e4950ee4e06104be3486e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033721" comment="kernel-64k-pagesize less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033723" comment="kernel-sn2 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 2727447879f3a66b9e835ba69837a927 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033724" comment="kernel-s390-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033725" comment="kernel-s390 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- 656a568516f192405b568d6fb399712b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033726" comment="kernel-s390x-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033727" comment="kernel-s390x less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 8980e701b12ad4f9c86c7fe931d87bd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a7de9a18ad854efa026811d679868b52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033729" comment="kernel-iseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033730" comment="kernel-pmac64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033731" comment="kernel-pseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- cbbe741f8b8b2844954325c7b19640e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033732" comment="kernel-um less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033733" comment="kernel-xenpae less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033734" comment="um-host-install-initrd less than 1.0-48.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033735" comment="um-host-kernel less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0657</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0657" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the Java Runtime Environment in Sun JDK and JRE 6 Update 1 and earlier, and 5.0 Update 13 and earlier, allow context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
	</description>
 </metadata>
<!-- 833adf8244bc08c2125b1b37b2407112 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0658</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0658" source="CVE"/>
	<description>
	slapd/back-bdb/modrdn.c in the BDB backend for slapd in OpenLDAP 2.3.39 allows remote authenticated users to cause a denial of service (daemon crash) via a modrdn operation with a NOOP (LDAP_X_NO_OPERATION) control, a related issue to CVE-2007-6698.
	</description>
 </metadata>
<!-- db61a2ae569744603c72552a38a58c12 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031603" comment="openldap2-back-ldap less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031604" comment="openldap2-back-meta less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031605" comment="openldap2-back-monitor less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031606" comment="openldap2-back-perl less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031607" comment="openldap2-client-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033718" comment="openldap2-client-64bit less than 9-200802110139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033719" comment="openldap2-client-x86 less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031608" comment="openldap2-client less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031609" comment="openldap2-devel-32bit less than 9-200802110138"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033720" comment="openldap2-devel-64bit less than 9-200802110139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031610" comment="openldap2-devel less than 2.2.24-4.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031611" comment="openldap2 less than 2.2.24-4.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0728</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0728" source="CVE"/>
	<description>
	The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger "heap corruption."
	</description>
 </metadata>
<!-- 512985d2cd3090bfb93dcb7b551179cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033747" comment="clamav less than 0.92.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0882</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882" source="CVE"/>
	<description>
	Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 1addc7e3aa69e266f0fba3fdfef8b6c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031703" comment="cups-client less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031704" comment="cups-devel less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031705" comment="cups-libs-32bit less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033751" comment="cups-libs-32bit less than 9-200803040018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033752" comment="cups-libs-64bit less than 9-200803040013"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033753" comment="cups-libs-x86 less than 9-200803040015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031706" comment="cups-libs less than 1.1.20-108.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031707" comment="cups less than 1.1.20-108.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0960</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960" source="CVE"/>
	<description>
	SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
	</description>
 </metadata>
<!-- 71093bdfd49361f6dbe32a8fde43b848 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033754" comment="net-snmp-32bit less than 9-200807112021"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031709" comment="net-snmp-devel less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031710" comment="net-snmp less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031711" comment="perl-SNMP less than 5.1.3.1-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1070</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070" source="CVE"/>
	<description>
	The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 968678e668eda057d4bdaf20099beaf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031712" comment="ethereal less than 0.10.13-2.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1071</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071" source="CVE"/>
	<description>
	The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet.
	</description>
 </metadata>
<!-- 968678e668eda057d4bdaf20099beaf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031712" comment="ethereal less than 0.10.13-2.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1072</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072" source="CVE"/>
	<description>
	The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug.
	</description>
 </metadata>
<!-- 968678e668eda057d4bdaf20099beaf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031712" comment="ethereal less than 0.10.13-2.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1100</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1100" source="CVE"/>
	<description>
	Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1105</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105" source="CVE"/>
	<description>
	Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
	</description>
 </metadata>
<!-- b465bc7cbc2819f28527f0fc40c5e3c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031718" comment="libsmbclient-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033755" comment="libsmbclient-32bit less than 9-200805282145"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033756" comment="libsmbclient-64bit less than 9-200805282149"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031719" comment="libsmbclient-devel less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031720" comment="libsmbclient less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031721" comment="samba-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033757" comment="samba-32bit less than 9-200805282145"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031722" comment="samba-client-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033758" comment="samba-client-32bit less than 9-200805282145"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031723" comment="samba-client less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031724" comment="samba-doc less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031725" comment="samba-pdb less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031726" comment="samba-python less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031727" comment="samba-vscan less than 0.3.6b-0.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031728" comment="samba-winbind-32bit less than 9-200805282142"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033759" comment="samba-winbind-32bit less than 9-200805282145"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031729" comment="samba-winbind less than 3.0.26a-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031730" comment="samba less than 3.0.26a-0.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1145</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1145" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1185</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1185" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1186, aka "the first issue."
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1186</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1186" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine for Sun Java Runtime Environment (JRE) and JDK 5.0 Update 13 and earlier, and SDK/JRE 1.4.2_16 and earlier, allows remote attackers to gain privileges via an untrusted application or applet, a different issue than CVE-2008-1185, aka "the second issue."
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1187</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34ff626d99ce5b395d23381dd99d55fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033665" comment="IBMJava2-JRE less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033666" comment="IBMJava2-JRE less than 1.4.2-0.123"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033667" comment="IBMJava2-SDK less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033668" comment="IBMJava2-SDK less than 1.4.2-0.123"/>
		</criteria>
	</criteria>
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1188</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1188" source="CVE"/>
	<description>
	Multiple buffer overflows in the useEncodingDecl function in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allow remote attackers to execute arbitrary code via a JNLP file with (1) a long key name in the xml header or (2) a long charset value, different issues than CVE-2008-1189, aka "The first two issues."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1189</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1189" source="CVE"/>
	<description>
	Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different issue than CVE-2008-1188, aka the "third" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1190</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1190" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to gain privileges via an untrusted application, a different issue than CVE-2008-1191, aka the "fourth" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1191</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1191" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier allows remote attackers to create arbitrary files via an untrusted application, a different issue than CVE-2008-1190, aka "The fifth issue."
	</description>
 </metadata>
<!-- 981c2591380984c2225999d768ea9e97 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1192</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1192" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in for Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier, and 1.3.1_21 and earlier; allows remote attackers to bypass the same origin policy and "execute local applications" via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1193</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1193" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment Image Parsing Library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to gain privileges via an untrusted application.
	</description>
 </metadata>
<!-- 833adf8244bc08c2125b1b37b2407112 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1194</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1194" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the color management library in Sun JDK and JRE 6 Update 4 and earlier, and 5.0 Update 14 and earlier, allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 833adf8244bc08c2125b1b37b2407112 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1195</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1195" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun JDK and Java Runtime Environment (JRE) 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to access arbitrary network services on the local host via unspecified vectors related to JavaScript and Java APIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1196</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 34ff626d99ce5b395d23381dd99d55fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033665" comment="IBMJava2-JRE less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033666" comment="IBMJava2-JRE less than 1.4.2-0.123"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033667" comment="IBMJava2-SDK less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033668" comment="IBMJava2-SDK less than 1.4.2-0.123"/>
		</criteria>
	</criteria>
	<!-- 58add69e54bc88010b4ffea7b648baf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033593" comment="IBMJava2-JRE less than 1.4.2-0.114"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033594" comment="IBMJava2-SDK less than 1.4.2-0.114"/>
		</criteria>
	</criteria>
	<!-- 60ee4b5cee653c4418c0dec544b13d34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033595" comment="IBMJava2-JRE less than 1.4.2-0.112"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033596" comment="IBMJava2-SDK less than 1.4.2-0.112"/>
		</criteria>
	</criteria>
	<!-- 833adf8244bc08c2125b1b37b2407112 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033629" comment="IBMJava5-JRE less than 1.5.0-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033630" comment="IBMJava5-SDK less than 1.5.0-0.22"/>
		</criteria>
	</criteria>
	<!-- 981c2591380984c2225999d768ea9e97 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031735" comment="java2-jre less than 1.4.2-129.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031736" comment="java2 less than 1.4.2-129.40"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1232</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
	</description>
 </metadata>
<!-- 23efc5af9808f5fd805226a8dbae7ea1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033760" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033761" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033762" comment="jakarta-tomcat-doc less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033763" comment="jakarta-tomcat-examples less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031737" comment="jakarta-tomcat less than 5.0.19-29.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1233</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via "XPCNativeWrapper pollution."
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1234</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to inject arbitrary web script or HTML via event handlers, aka "Universal XSS using event handlers."
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1235</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allows remote attackers to execute arbitrary code via unknown vectors that cause JavaScript to execute with the wrong principal, aka "Privilege escalation via incorrect principals."
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1236</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the layout engine.
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1237</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.13, Thunderbird before 2.0.0.13, and SeaMonkey before 1.1.9 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to the JavaScript engine.
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1238</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9, when generating the HTTP Referer header, does not list the entire URL when it contains Basic Authentication credentials without a username, which makes it easier for remote attackers to bypass application protection mechanisms that rely on Referer headers, such as with some Cross-Site Request Forgery (CSRF) mechanisms.
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1240</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240" source="CVE"/>
	<description>
	LiveConnect in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 does not properly parse the content origin for jar: URIs before sending them to the Java plugin, which allows remote attackers to access arbitrary ports on the local machine.  NOTE: this is closely related to CVE-2008-1195.
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1241</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241" source="CVE"/>
	<description>
	GUI overlay vulnerability in Mozilla Firefox before 2.0.0.13 and SeaMonkey before 1.1.9 allows remote attackers to spoof form elements and redirect user inputs via a borderless XUL pop-up window from a background tab.
	</description>
 </metadata>
<!-- 8e287f4ed038cb8bbf6b06ae8f9ce9e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033644" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031477" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031478" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031479" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031480" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031481" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031482" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031484" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031485" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031486" comment="mozilla less than 1.8_seamonkey_1.0.9-1.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1367</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367" source="CVE"/>
	<description>
	gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e03d5b97d06e1b13d14d5cdd961584 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033698" comment="kernel-s390-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033699" comment="kernel-s390 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 2ce8206e75a69d956cffa543e36de355 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033700" comment="kernel-s390x-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033701" comment="kernel-s390x less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 579ba4eeb5ca56dd5d0862061000e9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033703" comment="kernel-um less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033705" comment="kernel-xenpae less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033706" comment="um-host-install-initrd less than 1.0-48.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033707" comment="um-host-kernel less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 741a70086940bf89a19a5a484413c337 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 7f769b899bab51d771d99e5617baee00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033708" comment="kernel-64k-pagesize less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033709" comment="kernel-sn2 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 905ed62c59aa08ffca4e5a0d1e784e17 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033710" comment="kernel-iseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033711" comment="kernel-pmac64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033712" comment="kernel-pseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1372</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372" source="CVE"/>
	<description>
	bzlib.c in bzip2 before 1.0.5 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted file that triggers a buffer over-read, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- f2bc363a599bad27648d721673858602 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031738" comment="bzip2-32bit less than 9-200803201535"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033764" comment="bzip2-32bit less than 9-200803201536"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033765" comment="bzip2-64bit less than 9-200803201536"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033766" comment="bzip2-x86 less than 9-200803201535"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031739" comment="bzip2 less than 1.0.2-346.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1373</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373" source="CVE"/>
	<description>
	Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.
	</description>
 </metadata>
<!-- b8c1c10ee3584bcc23b201ff91e9ce95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031655" comment="cups-client less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031656" comment="cups-devel less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031657" comment="cups-libs-32bit less than 9-200803201838"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033741" comment="cups-libs-32bit less than 9-200803201848"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033742" comment="cups-libs-64bit less than 9-200803210144"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033743" comment="cups-libs-x86 less than 9-200803201838"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031658" comment="cups-libs less than 1.1.20-108.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031659" comment="cups less than 1.1.20-108.50"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1375</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1375" source="CVE"/>
	<description>
	Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e03d5b97d06e1b13d14d5cdd961584 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033698" comment="kernel-s390-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033699" comment="kernel-s390 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 2ce8206e75a69d956cffa543e36de355 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033700" comment="kernel-s390x-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033701" comment="kernel-s390x less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 579ba4eeb5ca56dd5d0862061000e9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033703" comment="kernel-um less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033705" comment="kernel-xenpae less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033706" comment="um-host-install-initrd less than 1.0-48.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033707" comment="um-host-kernel less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 741a70086940bf89a19a5a484413c337 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 7f769b899bab51d771d99e5617baee00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033708" comment="kernel-64k-pagesize less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033709" comment="kernel-sn2 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 905ed62c59aa08ffca4e5a0d1e784e17 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033710" comment="kernel-iseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033711" comment="kernel-pmac64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033712" comment="kernel-pseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1377</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377" source="CVE"/>
	<description>
	The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5dc3845aa1a191befe81a3f246c6d3aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
	<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1379</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379" source="CVE"/>
	<description>
	Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5dc3845aa1a191befe81a3f246c6d3aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
	<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1382</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1382" source="CVE"/>
	<description>
	libpng 1.0.6 through 1.0.32, 1.2.0 through 1.2.26, and 1.4.0beta01 through 1.4.0beta19 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialized memory.
	</description>
 </metadata>
<!-- 81630a8ade2cfc4a99cec96923bdae81 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031745" comment="libpng-32bit less than 9-200804151618"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033767" comment="libpng-64bit less than 9-200804151629"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033768" comment="libpng-devel-64bit less than 9-200804151629"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031746" comment="libpng-devel less than 1.2.5-182.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033769" comment="libpng-x86 less than 9-200804151618"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031747" comment="libpng less than 1.2.5-182.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1387</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1387" source="CVE"/>
	<description>
	ClamAV before 0.93 allows remote attackers to cause a denial of service (CPU consumption) via a crafted ARJ archive, as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1389</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389" source="CVE"/>
	<description>
	libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1391</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391" source="CVE"/>
	<description>
	Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
	</description>
 </metadata>
<!-- 6c6c779a7e1b77757f542bf1cb6b5802 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063329" comment="glibc-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063330" comment="glibc-32bit less than 9-201008251911"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063331" comment="glibc-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063332" comment="glibc-devel-32bit less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063333" comment="glibc-devel-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063334" comment="glibc-devel-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063335" comment="glibc-devel less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063336" comment="glibc-html less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063337" comment="glibc-i18ndata less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063338" comment="glibc-info less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063339" comment="glibc-locale-32bit less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063340" comment="glibc-locale-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063341" comment="glibc-locale-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063342" comment="glibc-locale-x86 less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063343" comment="glibc-locale less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063344" comment="glibc-profile-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063345" comment="glibc-profile less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063346" comment="glibc-x86 less than 9-201008251911"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063347" comment="glibc less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063348" comment="nscd less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063349" comment="timezone less than 2.3.3-98.114"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1419</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1419" source="CVE"/>
	<description>
	Xiph.org libvorbis 1.2.0 and earlier does not properly handle a zero value for codebook.dim, which allows remote attackers to cause a denial of service (crash or infinite loop) or trigger an integer overflow.
	</description>
 </metadata>
<!-- 00af0d08c8abdb4db33c8b7206369c40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031748" comment="libvorbis-32bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033771" comment="libvorbis-32bit less than 9-200805201625"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033772" comment="libvorbis-64bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031749" comment="libvorbis-devel less than 1.0.1-56.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033773" comment="libvorbis-x86 less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031750" comment="libvorbis less than 1.0.1-56.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
	<description>
	Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 00af0d08c8abdb4db33c8b7206369c40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031748" comment="libvorbis-32bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033771" comment="libvorbis-32bit less than 9-200805201625"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033772" comment="libvorbis-64bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031749" comment="libvorbis-devel less than 1.0.1-56.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033773" comment="libvorbis-x86 less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031750" comment="libvorbis less than 1.0.1-56.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1423</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1423" source="CVE"/>
	<description>
	Integer overflow in a certain quantvals and quantlist calculation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted OGG file with a large virtual space for its codebook, which triggers a heap overflow.
	</description>
 </metadata>
<!-- 00af0d08c8abdb4db33c8b7206369c40 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031748" comment="libvorbis-32bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033771" comment="libvorbis-32bit less than 9-200805201625"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033772" comment="libvorbis-64bit less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031749" comment="libvorbis-devel less than 1.0.1-56.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033773" comment="libvorbis-x86 less than 9-200805201623"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031750" comment="libvorbis less than 1.0.1-56.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1447</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447" source="CVE"/>
	<description>
	The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
	</description>
 </metadata>
<!-- aa846ea840c9bf29e6974f3b6913e550 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031751" comment="bind-devel less than 9.3.4-4.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033774" comment="bind-utils-32bit less than 9-200806171754"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031752" comment="bind-utils-32bit less than 9-200806172350"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033775" comment="bind-utils-64bit less than 9-200806172216"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033776" comment="bind-utils-x86 less than 9-200806172350"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031753" comment="bind-utils less than 9.3.4-4.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031754" comment="bind less than 9.3.4-4.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1483</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1483" source="CVE"/>
	<description>
	OpenSSH 4.3p2, and probably other versions, allows local users to hijack forwarded X connections by causing ssh to set DISPLAY to :10, even when another process is listening on the associated port, as demonstrated by opening TCP port 6010 (IPv4) and sniffing a cookie sent by Emacs.
	</description>
 </metadata>
<!-- 0a4d98ee282fa46b8ffaf141da879687 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031760" comment="openssh-askpass less than 4.1p1-11.42"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031761" comment="openssh less than 4.1p1-11.42"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1612</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612" source="CVE"/>
	<description>
	The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit) via unknown vectors that cause an array to shrink to 0 entries, which triggers an assert error.  NOTE: this issue is due to an incorrect fix for CVE-2007-6239.
	</description>
 </metadata>
<!-- 0ddf17ea6314c99eb29463ccbdbf811e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033777" comment="squid less than 2.5.STABLE5-42.54"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1615</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1615" source="CVE"/>
	<description>
	Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12e03d5b97d06e1b13d14d5cdd961584 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033698" comment="kernel-s390-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033699" comment="kernel-s390 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 2ce8206e75a69d956cffa543e36de355 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033700" comment="kernel-s390x-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033701" comment="kernel-s390x less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 579ba4eeb5ca56dd5d0862061000e9d6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031592" comment="kernel-bigsmp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033703" comment="kernel-um less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033705" comment="kernel-xenpae less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033706" comment="um-host-install-initrd less than 1.0-48.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033707" comment="um-host-kernel less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 741a70086940bf89a19a5a484413c337 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033704" comment="kernel-xen less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 7f769b899bab51d771d99e5617baee00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033708" comment="kernel-64k-pagesize less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033702" comment="kernel-debug less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033709" comment="kernel-sn2 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
	<!-- 905ed62c59aa08ffca4e5a0d1e784e17 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031593" comment="kernel-default less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033710" comment="kernel-iseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033711" comment="kernel-pmac64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033712" comment="kernel-pseries64 less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031594" comment="kernel-smp less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031595" comment="kernel-source less than 2.6.5-7.312"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031596" comment="kernel-syms less than 2.6.5-7.312"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1673</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673" source="CVE"/>
	<description>
	The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16461d7e407e4950ee4e06104be3486e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033721" comment="kernel-64k-pagesize less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033723" comment="kernel-sn2 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 2727447879f3a66b9e835ba69837a927 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033724" comment="kernel-s390-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033725" comment="kernel-s390 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 656a568516f192405b568d6fb399712b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033726" comment="kernel-s390x-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033727" comment="kernel-s390x less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 8980e701b12ad4f9c86c7fe931d87bd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- a7de9a18ad854efa026811d679868b52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033729" comment="kernel-iseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033730" comment="kernel-pmac64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033731" comment="kernel-pseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- cbbe741f8b8b2844954325c7b19640e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033732" comment="kernel-um less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033733" comment="kernel-xenpae less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033734" comment="um-host-install-initrd less than 1.0-48.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033735" comment="um-host-kernel less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1679</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows.  NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033778" comment="python-32bit less than 9-200808010012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033779" comment="python-64bit less than 9-200808010015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033780" comment="python-x86 less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1683</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1683" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-0887.  Reason: This candidate is a duplicate of CVE-2008-0887.  Notes: All CVE users should reference CVE-2008-0887 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- e1fc750cdf4b6a2f11f38786fe93d587 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031774" comment="xscreensaver-gnome less than 4.16-2.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031775" comment="xscreensaver less than 4.16-2.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1693</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1693" source="CVE"/>
	<description>
	The CairoFont::create function in CairoFontEngine.cc in Poppler, possibly before 0.8.0, as used in Xpdf, Evince, ePDFview, KWord, and other applications, does not properly handle embedded fonts in PDF files, which allows remote attackers to execute arbitrary code via a crafted font object, related to dereferencing a function pointer associated with the type of this font object.
	</description>
 </metadata>
<!-- 1fe7567e863904a22cd58e6bceb4c035 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031785" comment="cups-client less than 1.1.20-108.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031786" comment="cups-devel less than 1.1.20-108.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031787" comment="cups-libs-32bit less than 9-200804172236"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033781" comment="cups-libs-32bit less than 9-200804172237"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033782" comment="cups-libs-64bit less than 9-200804172236"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033783" comment="cups-libs-x86 less than 9-200804172236"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031788" comment="cups-libs less than 1.1.20-108.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031789" comment="cups less than 1.1.20-108.52"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1767</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767" source="CVE"/>
	<description>
	Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
	</description>
 </metadata>
<!-- c607615c09d474655a6ba03802caa48c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033784" comment="libxslt-32bit less than 9-200805201625"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031790" comment="libxslt-32bit less than 9-200805201632"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033785" comment="libxslt-64bit less than 9-200805201632"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031791" comment="libxslt-devel less than 1.1.2-58.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033786" comment="libxslt-x86 less than 9-200805201632"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031792" comment="libxslt less than 1.1.2-58.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1806</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1806" source="CVE"/>
	<description>
	Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b06161048b1b9e09a9a2671fce97f428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033787" comment="freetype2-32bit less than 9-200806161815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031794" comment="freetype2-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033788" comment="freetype2-64bit less than 9-200806162314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033789" comment="freetype2-devel-32bit less than 9-200806161815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031795" comment="freetype2-devel-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033790" comment="freetype2-devel-64bit less than 9-200806162314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031796" comment="freetype2-devel less than 2.1.7-53.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033791" comment="freetype2-x86 less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031797" comment="freetype2 less than 2.1.7-53.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1807</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1807" source="CVE"/>
	<description>
	FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption.
	</description>
 </metadata>
<!-- b06161048b1b9e09a9a2671fce97f428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033787" comment="freetype2-32bit less than 9-200806161815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031794" comment="freetype2-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033788" comment="freetype2-64bit less than 9-200806162314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033789" comment="freetype2-devel-32bit less than 9-200806161815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031795" comment="freetype2-devel-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033790" comment="freetype2-devel-64bit less than 9-200806162314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031796" comment="freetype2-devel less than 2.1.7-53.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033791" comment="freetype2-x86 less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031797" comment="freetype2 less than 2.1.7-53.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1808</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808" source="CVE"/>
	<description>
	Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- b06161048b1b9e09a9a2671fce97f428 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033787" comment="freetype2-32bit less than 9-200806161815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031794" comment="freetype2-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033788" comment="freetype2-64bit less than 9-200806162314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033789" comment="freetype2-devel-32bit less than 9-200806161815"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031795" comment="freetype2-devel-32bit less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033790" comment="freetype2-devel-64bit less than 9-200806162314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031796" comment="freetype2-devel less than 2.1.7-53.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033791" comment="freetype2-x86 less than 9-200806170342"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031797" comment="freetype2 less than 2.1.7-53.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1833</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1833" source="CVE"/>
	<description>
	Heap-based buffer overflow in pe.c in libclamav in ClamAV 0.92.1 allows remote attackers to execute arbitrary code via a crafted WWPack compressed PE binary.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1835</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1835" source="CVE"/>
	<description>
	ClamAV before 0.93 allows remote attackers to bypass the scanning enging via a RAR file with an invalid version number, which cannot be parsed by ClamAV but can be extracted by Winrar.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1836</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1836" source="CVE"/>
	<description>
	The rfc2231 function in message.c in libclamav in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via a crafted message that produces a string that is not null terminated, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1837</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1837" source="CVE"/>
	<description>
	libclamunrar in ClamAV before 0.93 allows remote attackers to cause a denial of service (crash) via crafted RAR files that trigger "memory problems," as demonstrated by the PROTOS GENOME test suite for Archive Formats.
	</description>
 </metadata>
<!-- 740fd3395237a0459fcd46cc91a9dbd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033717" comment="clamav less than 0.93-0.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1887</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887" source="CVE"/>
	<description>
	Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033778" comment="python-32bit less than 9-200808010012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033779" comment="python-64bit less than 9-200808010015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033780" comment="python-x86 less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1891</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1891" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1927</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1927" source="CVE"/>
	<description>
	Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters.  NOTE: this issue might only be present on certain operating systems.
	</description>
 </metadata>
<!-- 20ce81a11a5c6f370b6cf14264e38cf0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031798" comment="perl-32bit less than 9-200807111457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033792" comment="perl-32bit less than 9-200807111506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033793" comment="perl-64bit less than 9-200807111454"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033794" comment="perl-x86 less than 9-200807111457"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031799" comment="perl less than 5.8.3-32.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1948</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1948" source="CVE"/>
	<description>
	The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.
	</description>
 </metadata>
<!-- 566c183b06655fd3c666c5d69f276831 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031802" comment="gnutls-devel less than 1.0.8-26.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031803" comment="gnutls less than 1.0.8-26.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1949</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1949" source="CVE"/>
	<description>
	The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.
	</description>
 </metadata>
<!-- 566c183b06655fd3c666c5d69f276831 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031802" comment="gnutls-devel less than 1.0.8-26.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031803" comment="gnutls less than 1.0.8-26.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1950</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1950" source="CVE"/>
	<description>
	Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.
	</description>
 </metadata>
<!-- 566c183b06655fd3c666c5d69f276831 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031802" comment="gnutls-devel less than 1.0.8-26.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031803" comment="gnutls less than 1.0.8-26.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2079</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079" source="CVE"/>
	<description>
	MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
	</description>
 </metadata>
<!-- 30a5e3996d30fa92e0adac8c1dafa7ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031104" comment="mysql-Max less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031106" comment="mysql-client less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031107" comment="mysql-devel less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031108" comment="mysql-shared less than 4.0.18-32.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031109" comment="mysql less than 4.0.18-32.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2086</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086" source="CVE"/>
	<description>
	Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2142</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142" source="CVE"/>
	<description>
	Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- bb5c8be6845a2742fab6bf5c07f76e76 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033807" comment="emacs-el less than 21.3-185.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031809" comment="emacs-info less than 21.3-185.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031810" comment="emacs-nox less than 21.3-185.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033808" comment="emacs-x11 less than 21.3-185.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031811" comment="emacs less than 21.3-185.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2235</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235" source="CVE"/>
	<description>
	OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093ac65717da9e9a9950e72fd32a5327 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031812" comment="opensc-devel less than 0.8.0-194.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031813" comment="opensc less than 0.8.0-194.4"/>
		</criteria>
	</criteria>
	<!-- c3fd31aad32a3c9d1c57dd1c890137ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031814" comment="opensc-devel less than 0.8.0-194.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031815" comment="opensc less than 0.8.0-194.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2292</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292" source="CVE"/>
	<description>
	Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
	</description>
 </metadata>
<!-- 71093bdfd49361f6dbe32a8fde43b848 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033754" comment="net-snmp-32bit less than 9-200807112021"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031709" comment="net-snmp-devel less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031710" comment="net-snmp less than 5.1.3.1-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031711" comment="perl-SNMP less than 5.1.3.1-0.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2315</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033778" comment="python-32bit less than 9-200808010012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033779" comment="python-64bit less than 9-200808010015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033780" comment="python-x86 less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2316</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316" source="CVE"/>
	<description>
	Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033778" comment="python-32bit less than 9-200808010012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033779" comment="python-64bit less than 9-200808010015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033780" comment="python-x86 less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2327</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327" source="CVE"/>
	<description>
	Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
	</description>
 </metadata>
<!-- 6ad5a94fc892aa5c6aeb1f575178024c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033809" comment="libtiff-32bit less than 9-200808201412"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031846" comment="libtiff-32bit less than 9-200808201417"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033810" comment="libtiff-64bit less than 9-200808201414"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033811" comment="libtiff-x86 less than 9-200808201417"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031847" comment="libtiff less than 3.6.1-38.38"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2360</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360" source="CVE"/>
	<description>
	Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5dc3845aa1a191befe81a3f246c6d3aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
	<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2361</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5dc3845aa1a191befe81a3f246c6d3aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
	<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2362</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362" source="CVE"/>
	<description>
	Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5dc3845aa1a191befe81a3f246c6d3aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
	<!-- f1d6c99d6205780cd2ffac2d4f799210 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031740" comment="XFree86-Xnest less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031741" comment="XFree86-Xprt less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031742" comment="XFree86-Xvfb less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031743" comment="XFree86-Xvnc less than 4.3.99.902-43.96"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031744" comment="XFree86-server less than 4.3.99.902-43.96"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2370</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
	</description>
 </metadata>
<!-- 23efc5af9808f5fd805226a8dbae7ea1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033760" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033761" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033762" comment="jakarta-tomcat-doc less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033763" comment="jakarta-tomcat-examples less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031737" comment="jakarta-tomcat less than 5.0.19-29.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2375</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2375" source="CVE"/>
	<description>
	Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
	</description>
 </metadata>
<!-- 8475be9d68f167f402e906db30c2365f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033812" comment="vsftpd less than 2.0.4-0.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2383</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2383" source="CVE"/>
	<description>
	CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.
	</description>
 </metadata>
<!-- df74b9f380d2758eba5d0159fe37a84e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031848" comment="XFree86-server less than 4.3.99.902-43.98"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031849" comment="XFree86 less than 4.3.99.902-43.98"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2641</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2641" source="CVE"/>
	<description>
	Unspecified vulnerability in Adobe Reader and Acrobat 7.0.9 and earlier, and 8.0 through 8.1.2, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors, related to an "input validation issue in a JavaScript method."
	</description>
 </metadata>
<!-- 2986c2829dd78462b9103d8682a29dbb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031850" comment="acroread less than 7.0.9-2.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2662</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2663</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2664</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664" source="CVE"/>
	<description>
	The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2712</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2712" source="CVE"/>
	<description>
	Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.
	</description>
 </metadata>
<!-- d33093c5830311c493a7cebdc1a9debe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031851" comment="gvim less than 6.2-235.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2713</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713" source="CVE"/>
	<description>
	libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27657e0c996e172b8f81f4ffbd5b67b3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033813" comment="clamav less than 0.93.1-0.1"/>
	</criteria>
	<!-- 8e8b2a1607c3bfd1b39d6fcef8f15d37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033814" comment="clamav less than 0.93.3-0.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2725</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2726</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2727</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2727" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2725.  Reason: This candidate is a duplicate of CVE-2008-2725.  Notes: All CVE users should reference CVE-2008-2725 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2728</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2728" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2726.  Reason: This candidate is a duplicate of CVE-2008-2726.  Notes: All CVE users should reference CVE-2008-2726 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031734" comment="ruby less than 1.8.1-42.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2729</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2008-2729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2729" source="CVE"/>
	<description>
	arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.
	</description>
 </metadata>
<!-- 8980e701b12ad4f9c86c7fe931d87bd7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2812</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812" source="CVE"/>
	<description>
	The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16461d7e407e4950ee4e06104be3486e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033721" comment="kernel-64k-pagesize less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033723" comment="kernel-sn2 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 2727447879f3a66b9e835ba69837a927 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033724" comment="kernel-s390-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033725" comment="kernel-s390 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 656a568516f192405b568d6fb399712b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033726" comment="kernel-s390x-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033727" comment="kernel-s390x less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 8980e701b12ad4f9c86c7fe931d87bd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- a7de9a18ad854efa026811d679868b52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033729" comment="kernel-iseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033730" comment="kernel-pmac64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033731" comment="kernel-pseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- cbbe741f8b8b2844954325c7b19640e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033732" comment="kernel-um less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033733" comment="kernel-xenpae less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033734" comment="um-host-install-initrd less than 1.0-48.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033735" comment="um-host-kernel less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2936</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2936" source="CVE"/>
	<description>
	Postfix before 2.3.15, 2.4 before 2.4.8, 2.5 before 2.5.4, and 2.6 before 2.6-20080814, when the operating system supports hard links to symlinks, allows local users to append e-mail messages to a file to which a root-owned symlink points, by creating a hard link to this symlink and then sending a message.  NOTE: this can be leveraged to gain privileges if there is a symlink to an init script.
	</description>
 </metadata>
<!-- f572eea698b3b6a0124f7004ea6579c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031852" comment="postfix less than 2.1.1-1.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2937</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2937" source="CVE"/>
	<description>
	Postfix 2.5 before 2.5.4 and 2.6 before 2.6-20080814 delivers to a mailbox file even when this file is not owned by the recipient, which allows local users to read e-mail messages by creating a mailbox file corresponding to another user's account name.
	</description>
 </metadata>
<!-- f572eea698b3b6a0124f7004ea6579c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031852" comment="postfix less than 2.1.1-1.24"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2938</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
	</description>
 </metadata>
<!-- 23efc5af9808f5fd805226a8dbae7ea1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033760" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033761" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033762" comment="jakarta-tomcat-doc less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033763" comment="jakarta-tomcat-examples less than 5.0.19-29.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031737" comment="jakarta-tomcat less than 5.0.19-29.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2939</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
	</description>
 </metadata>
<!-- d442bcbd4d332421f2d1be5fd728b2f4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031854" comment="apache2-devel less than 2.0.59-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033815" comment="apache2-doc less than 2.0.59-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033816" comment="apache2-example-pages less than 2.0.59-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031855" comment="apache2-prefork less than 2.0.59-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031856" comment="apache2-worker less than 2.0.59-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031857" comment="apache2 less than 2.0.59-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031853" comment="libapr0 less than 2.0.59-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2952</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-2952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952" source="CVE"/>
	<description>
	liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
	</description>
 </metadata>
<!-- da48a44725c6492d098066cb53b194a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031858" comment="openldap2-back-ldap less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031859" comment="openldap2-back-meta less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031860" comment="openldap2-back-monitor less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031861" comment="openldap2-back-perl less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031862" comment="openldap2-client-32bit less than 9-200808130009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033817" comment="openldap2-client-32bit less than 9-200808130018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033818" comment="openldap2-client-64bit less than 9-200808130011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033819" comment="openldap2-client-x86 less than 9-200808130009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031863" comment="openldap2-client less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031864" comment="openldap2-devel-32bit less than 9-200808130009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033820" comment="openldap2-devel-32bit less than 9-200808130018"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033821" comment="openldap2-devel-64bit less than 9-200808130011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031865" comment="openldap2-devel less than 2.2.24-4.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031866" comment="openldap2 less than 2.2.24-4.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3103</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3103" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Management Extensions (JMX) management agent in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier, when local monitoring is enabled, allows remote attackers to "perform unauthorized operations" via unspecified vectors.
	</description>
 </metadata>
<!-- 6fd31bcaa09d27a5bc7e69ca25de546a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033822" comment="IBMJava5-JRE less than 1.5.0-0.50"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033823" comment="IBMJava5-SDK less than 1.5.0-0.50"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3104</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet's outbound connections by connecting to localhost services running on the machine that loaded the applet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 088827f3d07ca4e8fd8f9bf2dd301a6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033824" comment="IBMJava2-JRE less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033825" comment="IBMJava2-JRE less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033826" comment="IBMJava2-JRE less than 1.4.2-0.131"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033827" comment="IBMJava2-SDK less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033828" comment="IBMJava2-SDK less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033829" comment="IBMJava2-SDK less than 1.4.2-0.131"/>
		</criteria>
	</criteria>
	<!-- 09d2e47016678e3f6cd7f0b9e4ac2d25 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033830" comment="IBMJava5-JRE less than 1.5.0-0.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033831" comment="IBMJava5-SDK less than 1.5.0-0.43"/>
		</criteria>
	</criteria>
	<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
		</criteria>
	</criteria>
	<!-- 6d440c204061f57768d8fdef010beb6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033832" comment="IBMJava5-JRE less than 1.5.0-0.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033833" comment="IBMJava5-SDK less than 1.5.0-0.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3106</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 09d2e47016678e3f6cd7f0b9e4ac2d25 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033830" comment="IBMJava5-JRE less than 1.5.0-0.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033831" comment="IBMJava5-SDK less than 1.5.0-0.43"/>
		</criteria>
	</criteria>
	<!-- 34ff626d99ce5b395d23381dd99d55fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033665" comment="IBMJava2-JRE less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033666" comment="IBMJava2-JRE less than 1.4.2-0.123"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033667" comment="IBMJava2-SDK less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033668" comment="IBMJava2-SDK less than 1.4.2-0.123"/>
		</criteria>
	</criteria>
	<!-- 6d440c204061f57768d8fdef010beb6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033832" comment="IBMJava5-JRE less than 1.5.0-0.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033833" comment="IBMJava5-SDK less than 1.5.0-0.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3107</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3107" source="CVE"/>
	<description>
	Unspecified vulnerability in the Virtual Machine in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to gain privileges via an untrusted (1) application or (2) applet, as demonstrated by an application or applet that grants itself privileges to (a) read local files, (b) write to local files, or (c) execute local programs.
	</description>
 </metadata>
<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3108</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108" source="CVE"/>
	<description>
	Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 09d2e47016678e3f6cd7f0b9e4ac2d25 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033830" comment="IBMJava5-JRE less than 1.5.0-0.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033831" comment="IBMJava5-SDK less than 1.5.0-0.43"/>
		</criteria>
	</criteria>
	<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
		</criteria>
	</criteria>
	<!-- 34ff626d99ce5b395d23381dd99d55fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033665" comment="IBMJava2-JRE less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033666" comment="IBMJava2-JRE less than 1.4.2-0.123"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033667" comment="IBMJava2-SDK less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033668" comment="IBMJava2-SDK less than 1.4.2-0.123"/>
		</criteria>
	</criteria>
	<!-- 6d440c204061f57768d8fdef010beb6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033832" comment="IBMJava5-JRE less than 1.5.0-0.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033833" comment="IBMJava5-SDK less than 1.5.0-0.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3111</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111" source="CVE"/>
	<description>
	Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 09d2e47016678e3f6cd7f0b9e4ac2d25 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033830" comment="IBMJava5-JRE less than 1.5.0-0.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033831" comment="IBMJava5-SDK less than 1.5.0-0.43"/>
		</criteria>
	</criteria>
	<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
		</criteria>
	</criteria>
	<!-- 34ff626d99ce5b395d23381dd99d55fb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033665" comment="IBMJava2-JRE less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033666" comment="IBMJava2-JRE less than 1.4.2-0.123"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033667" comment="IBMJava2-SDK less than 1.4.2-0.122"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033668" comment="IBMJava2-SDK less than 1.4.2-0.123"/>
		</criteria>
	</criteria>
	<!-- 6d440c204061f57768d8fdef010beb6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033832" comment="IBMJava5-JRE less than 1.5.0-0.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033833" comment="IBMJava5-SDK less than 1.5.0-0.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3112</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112" source="CVE"/>
	<description>
	Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 088827f3d07ca4e8fd8f9bf2dd301a6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033824" comment="IBMJava2-JRE less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033825" comment="IBMJava2-JRE less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033826" comment="IBMJava2-JRE less than 1.4.2-0.131"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033827" comment="IBMJava2-SDK less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033828" comment="IBMJava2-SDK less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033829" comment="IBMJava2-SDK less than 1.4.2-0.131"/>
		</criteria>
	</criteria>
	<!-- 09d2e47016678e3f6cd7f0b9e4ac2d25 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033830" comment="IBMJava5-JRE less than 1.5.0-0.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033831" comment="IBMJava5-SDK less than 1.5.0-0.43"/>
		</criteria>
	</criteria>
	<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
		</criteria>
	</criteria>
	<!-- 6d440c204061f57768d8fdef010beb6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033832" comment="IBMJava5-JRE less than 1.5.0-0.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033833" comment="IBMJava5-SDK less than 1.5.0-0.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3113</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 088827f3d07ca4e8fd8f9bf2dd301a6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033824" comment="IBMJava2-JRE less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033825" comment="IBMJava2-JRE less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033826" comment="IBMJava2-JRE less than 1.4.2-0.131"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033827" comment="IBMJava2-SDK less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033828" comment="IBMJava2-SDK less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033829" comment="IBMJava2-SDK less than 1.4.2-0.131"/>
		</criteria>
	</criteria>
	<!-- 09d2e47016678e3f6cd7f0b9e4ac2d25 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033830" comment="IBMJava5-JRE less than 1.5.0-0.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033831" comment="IBMJava5-SDK less than 1.5.0-0.43"/>
		</criteria>
	</criteria>
	<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
		</criteria>
	</criteria>
	<!-- 6d440c204061f57768d8fdef010beb6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033832" comment="IBMJava5-JRE less than 1.5.0-0.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033833" comment="IBMJava5-SDK less than 1.5.0-0.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3114</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 088827f3d07ca4e8fd8f9bf2dd301a6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033824" comment="IBMJava2-JRE less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033825" comment="IBMJava2-JRE less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033826" comment="IBMJava2-JRE less than 1.4.2-0.131"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033827" comment="IBMJava2-SDK less than 1.4.2-0.126"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033828" comment="IBMJava2-SDK less than 1.4.2-0.129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033829" comment="IBMJava2-SDK less than 1.4.2-0.131"/>
		</criteria>
	</criteria>
	<!-- 09d2e47016678e3f6cd7f0b9e4ac2d25 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033830" comment="IBMJava5-JRE less than 1.5.0-0.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033831" comment="IBMJava5-SDK less than 1.5.0-0.43"/>
		</criteria>
	</criteria>
	<!-- 0a2f6f756f222e5ae33fb9a54fb01088 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031867" comment="java2-jre less than 1.4.2-129.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031868" comment="java2 less than 1.4.2-129.43"/>
		</criteria>
	</criteria>
	<!-- 6d440c204061f57768d8fdef010beb6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033832" comment="IBMJava5-JRE less than 1.5.0-0.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033833" comment="IBMJava5-SDK less than 1.5.0-0.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3137</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137" source="CVE"/>
	<description>
	The GSM SMS dissector in Wireshark (formerly Ethereal) 0.99.2 through 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3138</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138" source="CVE"/>
	<description>
	The (1) PANA and (2) KISMET dissectors in Wireshark (formerly Ethereal) 0.99.3 through 1.0.0 allow remote attackers to cause a denial of service (application stop) via unknown vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3139</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139" source="CVE"/>
	<description>
	The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.  NOTE: this might be due to a use-after-free error.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3140</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140" source="CVE"/>
	<description>
	The syslog dissector in Wireshark (formerly Ethereal) 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors, possibly related to an "incomplete SS7 MSU syslog encapsulated packet."
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3141</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141" source="CVE"/>
	<description>
	Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3142</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142" source="CVE"/>
	<description>
	Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033778" comment="python-32bit less than 9-200808010012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033779" comment="python-64bit less than 9-200808010015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033780" comment="python-x86 less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3143</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143" source="CVE"/>
	<description>
	Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033778" comment="python-32bit less than 9-200808010012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033779" comment="python-64bit less than 9-200808010015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033780" comment="python-x86 less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3144</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144" source="CVE"/>
	<description>
	Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations.  NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031762" comment="python-32bit less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033778" comment="python-32bit less than 9-200808010012"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033779" comment="python-64bit less than 9-200808010015"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031763" comment="python-curses less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031764" comment="python-demo less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031765" comment="python-devel less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031766" comment="python-doc-pdf less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031767" comment="python-doc less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031768" comment="python-gdbm less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031769" comment="python-idle less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031770" comment="python-mpz less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031771" comment="python-tk less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033780" comment="python-x86 less than 9-200808010009"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031772" comment="python-xml less than 2.3.3-88.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031773" comment="python less than 2.3.3-88.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3145</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145" source="CVE"/>
	<description>
	The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3146</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146" source="CVE"/>
	<description>
	Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031869" comment="ethereal less than 0.10.13-2.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3271</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
	</description>
 </metadata>
<!-- fb4ec2e8c3670355efd3ca4ed3953b38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033834" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033835" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033836" comment="jakarta-tomcat-doc less than 5.0.19-29.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033837" comment="jakarta-tomcat-examples less than 5.0.19-29.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031875" comment="jakarta-tomcat less than 5.0.19-29.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3272</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272" source="CVE"/>
	<description>
	The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16461d7e407e4950ee4e06104be3486e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033721" comment="kernel-64k-pagesize less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033723" comment="kernel-sn2 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 2727447879f3a66b9e835ba69837a927 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033724" comment="kernel-s390-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033725" comment="kernel-s390 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 656a568516f192405b568d6fb399712b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033726" comment="kernel-s390x-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033727" comment="kernel-s390x less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 8980e701b12ad4f9c86c7fe931d87bd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- a7de9a18ad854efa026811d679868b52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033729" comment="kernel-iseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033730" comment="kernel-pmac64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033731" comment="kernel-pseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- cbbe741f8b8b2844954325c7b19640e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033732" comment="kernel-um less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033733" comment="kernel-xenpae less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033734" comment="um-host-install-initrd less than 1.0-48.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033735" comment="um-host-kernel less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3275</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275" source="CVE"/>
	<description>
	The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3281</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281" source="CVE"/>
	<description>
	libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document.
	</description>
 </metadata>
<!-- 6a4c53a4f0700f99972273ceb5bb6e49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031876" comment="libxml2-32bit less than 9-200809051309"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033838" comment="libxml2-32bit less than 9-200809051312"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033839" comment="libxml2-64bit less than 9-200809051310"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031877" comment="libxml2-devel less than 2.6.7-28.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033840" comment="libxml2-x86 less than 9-200809051309"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031879" comment="libxml2 less than 2.6.7-28.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3443</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443" source="CVE"/>
	<description>
	The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3520</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520" source="CVE"/>
	<description>
	Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033841" comment="jasper less than 1.701.0-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033842" comment="libjasper-32bit less than 9-200811141458"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031882" comment="libjasper-32bit less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033843" comment="libjasper-64bit less than 9-200811141456"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033844" comment="libjasper-x86 less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031883" comment="libjasper less than 1.701.0-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3521</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3521" source="CVE"/>
	<description>
	Race condition in the jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to cause a denial of service (program exit) by creating the appropriate tmp.XXXXXXXXXX temporary file, which causes Jasper to exit.  NOTE: this was originally reported as a symlink issue, but this was incorrect.  NOTE: some vendors dispute the severity of this issue, but it satisfies CVE's requirements for inclusion.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033841" comment="jasper less than 1.701.0-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033842" comment="libjasper-32bit less than 9-200811141458"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031882" comment="libjasper-32bit less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033843" comment="libjasper-64bit less than 9-200811141456"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033844" comment="libjasper-x86 less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031883" comment="libjasper less than 1.701.0-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
	<description>
	Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033841" comment="jasper less than 1.701.0-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033842" comment="libjasper-32bit less than 9-200811141458"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031882" comment="libjasper-32bit less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033843" comment="libjasper-64bit less than 9-200811141456"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033844" comment="libjasper-x86 less than 9-200811141502"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031883" comment="libjasper less than 1.701.0-1.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3525</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525" source="CVE"/>
	<description>
	The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16461d7e407e4950ee4e06104be3486e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033721" comment="kernel-64k-pagesize less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033723" comment="kernel-sn2 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 2727447879f3a66b9e835ba69837a927 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033724" comment="kernel-s390-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033725" comment="kernel-s390 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 656a568516f192405b568d6fb399712b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033726" comment="kernel-s390x-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033727" comment="kernel-s390x less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- 8980e701b12ad4f9c86c7fe931d87bd7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- a7de9a18ad854efa026811d679868b52 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033729" comment="kernel-iseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033730" comment="kernel-pmac64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033731" comment="kernel-pseries64 less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
	<!-- cbbe741f8b8b2844954325c7b19640e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031612" comment="kernel-bigsmp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033722" comment="kernel-debug less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031613" comment="kernel-default less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031614" comment="kernel-smp less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031615" comment="kernel-source less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031616" comment="kernel-syms less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033732" comment="kernel-um less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033728" comment="kernel-xen less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033733" comment="kernel-xenpae less than 2.6.5-7.314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033734" comment="um-host-install-initrd less than 1.0-48.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033735" comment="um-host-kernel less than 2.6.5-7.314"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3528</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528" source="CVE"/>
	<description>
	The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir-&gt;i_size and dir-&gt;i_blocks values and performing (a) read or (b) write operations.  NOTE: there are limited scenarios in which this crosses privilege boundaries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 159b6d8d14eb391abf36d4914d6b1a81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033845" comment="kernel-s390-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033846" comment="kernel-s390 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- 17e72f16c45f57d18ec6999ea4a0c696 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033847" comment="kernel-iseries64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033848" comment="kernel-pmac64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033849" comment="kernel-pseries64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- 608eb280879da5fdecef488bd7784dfb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033850" comment="kernel-xen less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- af534e16e1946a0401b765acfb9c0ec2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033851" comment="kernel-s390x-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033852" comment="kernel-s390x less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- ee9eda96ad81ff11df1777fff94f8834 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033853" comment="kernel-64k-pagesize less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033854" comment="kernel-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033855" comment="kernel-sn2 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- f8452f8de5562ed0c0c9d5b8aab02197 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031888" comment="kernel-bigsmp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033854" comment="kernel-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033856" comment="kernel-um less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033850" comment="kernel-xen less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033857" comment="kernel-xenpae less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033858" comment="um-host-install-initrd less than 1.0-48.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033859" comment="um-host-kernel less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3529</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3529" source="CVE"/>
	<description>
	Heap-based buffer overflow in the xmlParseAttValueComplex function in parser.c in libxml2 before 2.7.0 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a long XML entity name.
	</description>
 </metadata>
<!-- 6a4c53a4f0700f99972273ceb5bb6e49 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031876" comment="libxml2-32bit less than 9-200809051309"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033838" comment="libxml2-32bit less than 9-200809051312"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033839" comment="libxml2-64bit less than 9-200809051310"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031877" comment="libxml2-devel less than 2.6.7-28.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033840" comment="libxml2-x86 less than 9-200809051309"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031879" comment="libxml2 less than 2.6.7-28.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3639</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.
	</description>
 </metadata>
<!-- e400c570cdd9cb377678f746496466e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031889" comment="cups-client less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031890" comment="cups-devel less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033860" comment="cups-libs-32bit less than 9-200810021505"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031891" comment="cups-libs-32bit less than 9-200810021549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033861" comment="cups-libs-64bit less than 9-200810021507"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033862" comment="cups-libs-x86 less than 9-200810021549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031892" comment="cups-libs less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031893" comment="cups less than 1.1.20-108.54"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3640</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640" source="CVE"/>
	<description>
	Integer overflow in the WriteProlog function in texttops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- e400c570cdd9cb377678f746496466e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031889" comment="cups-client less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031890" comment="cups-devel less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033860" comment="cups-libs-32bit less than 9-200810021505"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031891" comment="cups-libs-32bit less than 9-200810021549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033861" comment="cups-libs-64bit less than 9-200810021507"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033862" comment="cups-libs-x86 less than 9-200810021549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031892" comment="cups-libs less than 1.1.20-108.54"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031893" comment="cups less than 1.1.20-108.54"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3641</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641" source="CVE"/>
	<description>
	The Hewlett-Packard Graphics Language (HPGL) filter in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via crafted pen width and pen color opcodes that overwrite arbitrary memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 780fd9d1e30deb80a800424357446b59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031894" comment="cups-client less than 1.1.20-108.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031895" comment="cups-devel less than 1.1.20-108.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033863" comment="cups-libs-32bit less than 9-200812030148"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031896" comment="cups-libs-32bit less than 9-200812030152"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033864" comment="cups-libs-64bit less than 9-200812030148"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033865" comment="cups-libs-x86 less than 9-200812030152"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031897" comment="cups-libs less than 1.1.20-108.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031898" comment="cups less than 1.1.20-108.56"/>
		</criteria>
	</criteria>
	<!-- e400c570cdd9cb377678f746496466e7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031889" comment="cups-client less than 1.1.20-108.54"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031890" comment="cups-devel less than 1.1.20-108.54"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033860" comment="cups-libs-32bit less than 9-200810021505"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031891" comment="cups-libs-32bit less than 9-200810021549"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033861" comment="cups-libs-64bit less than 9-200810021507"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033862" comment="cups-libs-x86 less than 9-200810021549"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031892" comment="cups-libs less than 1.1.20-108.54"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031893" comment="cups less than 1.1.20-108.54"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3651</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651" source="CVE"/>
	<description>
	Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals.
	</description>
 </metadata>
<!-- 002debd7fd5575e0f83a48921e02a556 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031899" comment="ipsec-tools less than 0.3.3-1.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3652</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652" source="CVE"/>
	<description>
	src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).
	</description>
 </metadata>
<!-- 002debd7fd5575e0f83a48921e02a556 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031899" comment="ipsec-tools less than 0.3.3-1.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3655</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655" source="CVE"/>
	<description>
	Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3656</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3657</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657" source="CVE"/>
	<description>
	The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3658</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658" source="CVE"/>
	<description>
	Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 4336a0af68f8f640e4b94b0e41923a0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033866" comment="apache-mod_php4 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033867" comment="apache2-mod_php4 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033868" comment="mod_php4-apache2 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031900" comment="mod_php4-core less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033869" comment="mod_php4-servlet less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031901" comment="php4-bcmath less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031902" comment="php4-bz2 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031903" comment="php4-calendar less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031904" comment="php4-ctype less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031905" comment="php4-curl less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031906" comment="php4-dba less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031907" comment="php4-dbase less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031908" comment="php4-devel less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031909" comment="php4-domxml less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031910" comment="php4-exif less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031911" comment="php4-fastcgi less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031912" comment="php4-filepro less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031913" comment="php4-ftp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031914" comment="php4-gd less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031915" comment="php4-gettext less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031916" comment="php4-gmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031917" comment="php4-iconv less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031918" comment="php4-imap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031919" comment="php4-ldap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031920" comment="php4-mbstring less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031921" comment="php4-mcal less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031922" comment="php4-mcrypt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031923" comment="php4-mhash less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031924" comment="php4-mime_magic less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031925" comment="php4-mysql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031926" comment="php4-pear less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031927" comment="php4-pgsql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031928" comment="php4-qtdom less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031929" comment="php4-readline less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031930" comment="php4-recode less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031932" comment="php4-session less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031933" comment="php4-shmop less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031934" comment="php4-snmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031935" comment="php4-sockets less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031936" comment="php4-swf less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031937" comment="php4-sysvsem less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031938" comment="php4-sysvshm less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031939" comment="php4-unixODBC less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031940" comment="php4-wddx less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031941" comment="php4-xslt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031942" comment="php4-yp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031943" comment="php4-zlib less than 4.3.4-43.87"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3659</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659" source="CVE"/>
	<description>
	Buffer overflow in the memnstr function in PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via the delimiter argument to the explode function.  NOTE: the scope of this issue is limited since most applications would not use an attacker-controlled delimiter, but local attacks against safe_mode are feasible.
	</description>
 </metadata>
<!-- 4336a0af68f8f640e4b94b0e41923a0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033866" comment="apache-mod_php4 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033867" comment="apache2-mod_php4 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033868" comment="mod_php4-apache2 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031900" comment="mod_php4-core less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033869" comment="mod_php4-servlet less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031901" comment="php4-bcmath less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031902" comment="php4-bz2 less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031903" comment="php4-calendar less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031904" comment="php4-ctype less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031905" comment="php4-curl less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031906" comment="php4-dba less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031907" comment="php4-dbase less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031908" comment="php4-devel less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031909" comment="php4-domxml less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031910" comment="php4-exif less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031911" comment="php4-fastcgi less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031912" comment="php4-filepro less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031913" comment="php4-ftp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031914" comment="php4-gd less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031915" comment="php4-gettext less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031916" comment="php4-gmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031917" comment="php4-iconv less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031918" comment="php4-imap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031919" comment="php4-ldap less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031920" comment="php4-mbstring less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031921" comment="php4-mcal less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031922" comment="php4-mcrypt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031923" comment="php4-mhash less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031924" comment="php4-mime_magic less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031925" comment="php4-mysql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031926" comment="php4-pear less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031927" comment="php4-pgsql less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031928" comment="php4-qtdom less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031929" comment="php4-readline less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031930" comment="php4-recode less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031932" comment="php4-session less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031933" comment="php4-shmop less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031934" comment="php4-snmp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031935" comment="php4-sockets less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031936" comment="php4-swf less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031937" comment="php4-sysvsem less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031938" comment="php4-sysvshm less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031939" comment="php4-unixODBC less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031940" comment="php4-wddx less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031941" comment="php4-xslt less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031942" comment="php4-yp less than 4.3.4-43.87"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031943" comment="php4-zlib less than 4.3.4-43.87"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3790</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790" source="CVE"/>
	<description>
	The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3835</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3835" source="CVE"/>
	<description>
	The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3836</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3836" source="CVE"/>
	<description>
	feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3837</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3863</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3863" source="CVE"/>
	<description>
	Stack-based buffer overflow in the read_special_escape function in src/psgen.c in GNU Enscript 1.6.1 and 1.6.4 beta, when the -e (aka special escapes processing) option is enabled, allows user-assisted remote attackers to execute arbitrary code via a crafted ASCII file, related to the setfilename command.
	</description>
 </metadata>
<!-- c62a897b906c327cb10e091f30f655f7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031945" comment="enscript less than 1.6.2-814.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3905</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905" source="CVE"/>
	<description>
	resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3912</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912" source="CVE"/>
	<description>
	libclamav in ClamAV before 0.94 allows attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an out-of-memory condition.
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3913</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913" source="CVE"/>
	<description>
	Multiple memory leaks in freshclam/manager.c in ClamAV before 0.94 might allow attackers to cause a denial of service (memory consumption) via unspecified vectors related to "error handling logic".
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3914</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in ClamAV before 0.94 have unknown impact and attack vectors related to file descriptor leaks on the "error path" in (1) libclamav/others.c and (2) libclamav/sis.c.
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3933</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3972</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3972" source="CVE"/>
	<description>
	pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.
	</description>
 </metadata>
<!-- c3fd31aad32a3c9d1c57dd1c890137ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031814" comment="opensc-devel less than 0.8.0-194.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031815" comment="opensc less than 0.8.0-194.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4058</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4059</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4059" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4060</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4060" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4061</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061" source="CVE"/>
	<description>
	Integer overflow in the MathML component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via an mtd element with a large integer value in the rowspan attribute, related to the layout engine.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4062</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4062" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4063</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4063" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and (1) a zero value of the "this" variable in the nsContentList::Item function; (2) interaction of the indic IME extension, a Hindi language selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4064</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to graphics rendering and (1) handling of a long alert messagebox in the cairo_surface_set_device_offset function, (2) integer overflows when handling animated PNG data in the info_callback function in nsPNGDecoder.cpp, and (3) an integer overflow when handling SVG data in the nsSVGFEGaussianBlurElement::SetupPredivide function in nsSVGFilters.cpp.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4065</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4066</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4066" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&amp;#56325ascript" sequence, aka "HTML escaped low surrogates bug."
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4067</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4068</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4068" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4069</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4069" source="CVE"/>
	<description>
	The XBM decoder in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to read uninitialized memory, and possibly obtain sensitive information in opportunistic circumstances, via a crafted XBM image file.
	</description>
 </metadata>
<!-- f6315c5c6bde445e37c2730b22895fc0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033739" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031631" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031632" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031633" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031634" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031635" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031636" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031638" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031639" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031640" comment="mozilla less than 1.8_seamonkey_1.0.9-1.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4097</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4097" source="CVE"/>
	<description>
	MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
	</description>
 </metadata>
<!-- 004cd7faf8f5e6ae4d2cfb50caa21db0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031947" comment="mysql-Max less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031949" comment="mysql-client less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031950" comment="mysql-devel less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031951" comment="mysql-shared less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031952" comment="mysql less than 4.0.18-32.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4098</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4098" source="CVE"/>
	<description>
	MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
	</description>
 </metadata>
<!-- 004cd7faf8f5e6ae4d2cfb50caa21db0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031947" comment="mysql-Max less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031949" comment="mysql-client less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031950" comment="mysql-devel less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031951" comment="mysql-shared less than 4.0.18-32.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031952" comment="mysql less than 4.0.18-32.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4101</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4101" source="CVE"/>
	<description>
	Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument after a (2) "Ctrl-]" (control close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke sequence, a different issue than CVE-2008-2712.
	</description>
 </metadata>
<!-- d33093c5830311c493a7cebdc1a9debe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031851" comment="gvim less than 6.2-235.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4109</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4109" source="CVE"/>
	<description>
	A certain Debian patch for OpenSSH before 4.3p2-9etch3 on etch; before 4.6p1-1 on sid and lenny; and on other distributions such as SUSE uses functions that are not async-signal-safe in the signal handler for login timeouts, which allows remote attackers to cause a denial of service (connection slot exhaustion) via multiple login attempts. NOTE: this issue exists because of an incorrect fix for CVE-2006-5051.
	</description>
 </metadata>
<!-- 55fbc6c14f7e9bffc041b18fa3a3a0c4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031953" comment="openssh-askpass less than 4.1p1-11.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031954" comment="openssh less than 4.1p1-11.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4210</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210" source="CVE"/>
	<description>
	fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 159b6d8d14eb391abf36d4914d6b1a81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033845" comment="kernel-s390-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033846" comment="kernel-s390 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- 17e72f16c45f57d18ec6999ea4a0c696 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033847" comment="kernel-iseries64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033848" comment="kernel-pmac64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033849" comment="kernel-pseries64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- 608eb280879da5fdecef488bd7784dfb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033850" comment="kernel-xen less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- af534e16e1946a0401b765acfb9c0ec2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033851" comment="kernel-s390x-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033852" comment="kernel-s390x less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- ee9eda96ad81ff11df1777fff94f8834 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033853" comment="kernel-64k-pagesize less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033854" comment="kernel-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033855" comment="kernel-sn2 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- f8452f8de5562ed0c0c9d5b8aab02197 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031888" comment="kernel-bigsmp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033854" comment="kernel-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033856" comment="kernel-um less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033850" comment="kernel-xen less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033857" comment="kernel-xenpae less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033858" comment="um-host-install-initrd less than 1.0-48.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033859" comment="um-host-kernel less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
	<description>
	Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
	</description>
 </metadata>
<!-- 7b9a35f48b4e544e836f3f113ed2bedc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033870" comment="libxml2-32bit less than 9-200811201349"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031955" comment="libxml2-32bit less than 9-200811201357"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033871" comment="libxml2-64bit less than 9-200811201351"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031956" comment="libxml2-devel less than 2.6.7-28.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033872" comment="libxml2-x86 less than 9-200811201357"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031958" comment="libxml2 less than 2.6.7-28.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
	<description>
	Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
	</description>
 </metadata>
<!-- 7c646ef4d38effcdd2a8421201f81211 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033873" comment="libxml2-32bit less than 9-200811071618"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031959" comment="libxml2-32bit less than 9-200811071633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033874" comment="libxml2-64bit less than 9-200811071629"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031961" comment="libxml2-devel less than 2.6.7-28.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033875" comment="libxml2-x86 less than 9-200811071633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031960" comment="libxml2 less than 2.6.7-28.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4309</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309" source="CVE"/>
	<description>
	Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.
	</description>
 </metadata>
<!-- 517491e0816d67ef60d161f3189b3d20 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033876" comment="net-snmp-32bit less than 9-200811201409"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031962" comment="net-snmp-devel less than 5.1.3.1-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031963" comment="net-snmp less than 5.1.3.1-0.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031964" comment="perl-SNMP less than 5.1.3.1-0.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4395</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395" source="CVE"/>
	<description>
	Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux kernel 2.6 allow remote attackers to execute arbitrary code by sending packets over a local wireless network that specify long ESSIDs.
	</description>
 </metadata>
<!-- 1515d78d43995dddb6687965c5c35f6e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031965" comment="km_ndiswrapper less than 1.1-4.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4456</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4456" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
	</description>
 </metadata>
<!-- 877515d582920d4f52d3e647af5b2d42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054280" comment="mysql-Max less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054282" comment="mysql-client less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054283" comment="mysql-devel less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054284" comment="mysql-shared less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054285" comment="mysql less than 4.0.18-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4552</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552" source="CVE"/>
	<description>
	The good_client function in nfs-utils 1.0.9, and possibly other versions before 1.1.3, invokes the hosts_ctl function with the wrong order of arguments, which causes TCP Wrappers to ignore netgroups and allows remote attackers to bypass intended access restrictions.
	</description>
 </metadata>
<!-- 3967fcc22b1b0321540d24f5e3d833c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031966" comment="nfs-utils less than 1.0.6-103.33"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4636</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4636" source="CVE"/>
	<description>
	yast2-backup 2.14.2 through 2.16.6 on SUSE Linux and Novell Linux allows local users to gain privileges via shell metacharacters in filenames used by the backup process.
	</description>
 </metadata>
<!-- 9b5088ff155f0ef71eeac627566a4ebe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031971" comment="yast2-backup less than 2.9.22-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4677</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4677" source="CVE"/>
	<description>
	autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords.  NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating "I'm assuming that they're using the same id and password on that unchanged hostname, deliberately."
	</description>
 </metadata>
<!-- d33093c5830311c493a7cebdc1a9debe -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031851" comment="gvim less than 6.2-235.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4680</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680" source="CVE"/>
	<description>
	packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4681</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681" source="CVE"/>
	<description>
	Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4683</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683" source="CVE"/>
	<description>
	The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4685</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that trigger an exception.
	</description>
 </metadata>
<!-- 3e457ce69a705b7f5c4fd47a764e90e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031946" comment="ethereal less than 0.10.13-2.38"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4864</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-4864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4864" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.
	</description>
 </metadata>
<!-- 3118793234bb8b5e0dcba89b0a141f28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033877" comment="python-32bit less than 9-200812011726"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031972" comment="python-32bit less than 9-200812011728"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033878" comment="python-64bit less than 9-200812011733"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031973" comment="python-curses less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031974" comment="python-demo less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031975" comment="python-devel less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031976" comment="python-doc-pdf less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031977" comment="python-doc less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031978" comment="python-gdbm less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031979" comment="python-idle less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031980" comment="python-mpz less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031981" comment="python-tk less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033879" comment="python-x86 less than 9-200812011728"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031982" comment="python-xml less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031983" comment="python less than 2.3.3-88.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5012</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5012" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote attackers to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker.  NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5013</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5014</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014" source="CVE"/>
	<description>
	jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying the window.__proto__.__proto__ object in a way that causes a lock on a non-native object, which triggers an assertion failure related to the OBJ_IS_NATIVE function.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5016</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5017</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017" source="CVE"/>
	<description>
	Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5018</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5021</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021" source="CVE"/>
	<description>
	nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5022</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022" source="CVE"/>
	<description>
	The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5023</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023" source="CVE"/>
	<description>
	Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5024</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5029</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029" source="CVE"/>
	<description>
	The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 159b6d8d14eb391abf36d4914d6b1a81 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033845" comment="kernel-s390-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033846" comment="kernel-s390 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- 17e72f16c45f57d18ec6999ea4a0c696 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033847" comment="kernel-iseries64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033848" comment="kernel-pmac64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033849" comment="kernel-pseries64 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- 608eb280879da5fdecef488bd7784dfb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033850" comment="kernel-xen less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- af534e16e1946a0401b765acfb9c0ec2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033851" comment="kernel-s390x-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033852" comment="kernel-s390x less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- ee9eda96ad81ff11df1777fff94f8834 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033853" comment="kernel-64k-pagesize less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033854" comment="kernel-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033855" comment="kernel-sn2 less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
	<!-- f8452f8de5562ed0c0c9d5b8aab02197 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031888" comment="kernel-bigsmp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033854" comment="kernel-debug less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031884" comment="kernel-default less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031885" comment="kernel-smp less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031886" comment="kernel-source less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031887" comment="kernel-syms less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033856" comment="kernel-um less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033850" comment="kernel-xen less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033857" comment="kernel-xenpae less than 2.6.5-7.315"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033858" comment="um-host-install-initrd less than 1.0-48.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033859" comment="um-host-kernel less than 2.6.5-7.315"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5031</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c.  NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
	</description>
 </metadata>
<!-- 3118793234bb8b5e0dcba89b0a141f28 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033877" comment="python-32bit less than 9-200812011726"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031972" comment="python-32bit less than 9-200812011728"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033878" comment="python-64bit less than 9-200812011733"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031973" comment="python-curses less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031974" comment="python-demo less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031975" comment="python-devel less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031976" comment="python-doc-pdf less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031977" comment="python-doc less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031978" comment="python-gdbm less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031979" comment="python-idle less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031980" comment="python-mpz less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031981" comment="python-tk less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033879" comment="python-x86 less than 9-200812011728"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031982" comment="python-xml less than 2.3.3-88.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031983" comment="python less than 2.3.3-88.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5050</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050" source="CVE"/>
	<description>
	Off-by-one error in the get_unicode_name function (libclamav/vba_extract.c) in Clam Anti-Virus (ClamAV) before 0.94.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted VBA project file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 450e4f3dc2bb2b50defd94f51c867c7b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033880" comment="clamav less than 0.94.1-2.1"/>
	</criteria>
	<!-- 5b4a8043cd9021ddb8f1ad4d92bea9b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033880" comment="clamav less than 0.94.1-2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5052</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5052" source="CVE"/>
	<description>
	The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger memory corruption, as demonstrated by e4x/extensions/regress-410192.js.
	</description>
 </metadata>
<!-- 55d1889fabf24d9bac066219efec8b53 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033740" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031645" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031646" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031647" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031648" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031649" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031650" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031652" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031653" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031654" comment="mozilla less than 1.8_seamonkey_1.0.9-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
	<description>
	OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
	</description>
 </metadata>
<!-- 0a0c29d2fa5ecac3cdf58a731bb7cd9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033881" comment="openssl-32bit less than 9-200901211332"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031985" comment="openssl-32bit less than 9-200901211340"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033882" comment="openssl-64bit less than 9-200901211338"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033883" comment="openssl-devel-32bit less than 9-200901211332"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031986" comment="openssl-devel-32bit less than 9-200901211340"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033884" comment="openssl-devel-64bit less than 9-200901211338"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031987" comment="openssl-devel less than 0.9.7d-15.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031988" comment="openssl-doc less than 0.9.7d-15.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033885" comment="openssl-x86 less than 9-200901211340"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031989" comment="openssl less than 0.9.7d-15.37"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5078</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5078" source="CVE"/>
	<description>
	Multiple buffer overflows in the (1) recognize_eps_file function (src/psgen.c) and (2) tilde_subst function (src/util.c) in GNU enscript 1.6.1, and possibly earlier, might allow remote attackers to execute arbitrary code via an epsf escape sequence with a long filename.
	</description>
 </metadata>
<!-- b8fe6200e0d56eee4d9169a28de8f327 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031990" comment="enscript less than 1.6.2-814.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5138</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5138" source="CVE"/>
	<description>
	passwdehd in libpam-mount 0.43 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/passwdehd.##### temporary file.
	</description>
 </metadata>
<!-- f905a4343d6b67e03555204fa330a1ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033886" comment="pam_mount-32bit less than 9-200901131807"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033887" comment="pam_mount-32bit less than 9-200901131814"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033888" comment="pam_mount-64bit less than 9-200901131809"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033889" comment="pam_mount less than 0.9.22-1.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5286</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5286" source="CVE"/>
	<description>
	Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.
	</description>
 </metadata>
<!-- 780fd9d1e30deb80a800424357446b59 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031894" comment="cups-client less than 1.1.20-108.56"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031895" comment="cups-devel less than 1.1.20-108.56"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033863" comment="cups-libs-32bit less than 9-200812030148"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031896" comment="cups-libs-32bit less than 9-200812030152"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033864" comment="cups-libs-64bit less than 9-200812030148"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033865" comment="cups-libs-x86 less than 9-200812030152"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031897" comment="cups-libs less than 1.1.20-108.56"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031898" comment="cups less than 1.1.20-108.56"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5314</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314" source="CVE"/>
	<description>
	Stack consumption vulnerability in libclamav/special.c in ClamAV before 0.94.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted JPEG file, related to the cli_check_jpeg_exploit, jpeg_check_photoshop, and jpeg_check_photoshop_8bim functions.
	</description>
 </metadata>
<!-- 58bd2aa336e9e6556e5f6e3d5954619c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033890" comment="clamav less than 0.94.2-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5339</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to perform network connections to unauthorized hosts via unknown vectors, aka CR 6727079.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5340</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to gain privileges to access local files or applications via unknown vectors, aka 6727081.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5341</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5341" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted JWS applications to obtain the pathname of the JWS cache and the application username via unknown vectors, aka CR 6727071.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5342</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342" source="CVE"/>
	<description>
	Unspecified vulnerability in the BasicService for Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted downloaded applications to cause local files to be displayed in the browser of the user of the untrusted application via unknown vectors, aka 6767668.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5343</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343" source="CVE"/>
	<description>
	Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows remote attackers to make unauthorized network connections and hijack HTTP sessions via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR" and CR 6707535.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5344</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applets to read arbitrary files and make unauthorized network connections via unknown vectors related to applet classloading, aka 6716217.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5345</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier allows code that is loaded from a local filesystem to read arbitrary files and make unauthorized connections to localhost via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5346</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 or earlier allows untrusted applets and applications to read arbitrary memory via a crafted ZIP file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5347</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5347" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier allow untrusted applets and applications to gain privileges via vectors related to access to inner classes in the (1) JAX-WS and (2) JAXB packages.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5348</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier, when using Kerberos authentication, allows remote attackers to cause a denial of service (OS resource consumption) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5349</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows remote attackers to cause a denial of service (CPU consumption) via a crafted RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d1b1f4c96c547a1f3e96c305d4055d6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055088" comment="IBMJava2-JRE less than 1.4.2-0.144"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055089" comment="IBMJava2-JRE less than 1.4.2-0.146"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055090" comment="IBMJava2-SDK less than 1.4.2-0.144"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055091" comment="IBMJava2-SDK less than 1.4.2-0.146"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5350</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applications and applets to list the contents of the operating user's directory via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5351</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier accepts UTF-8 encodings that are not the "shortest" form, which makes it easier for attackers to bypass protection mechanisms for other applications that rely on shortest-form UTF-8 encodings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5352</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5352" source="CVE"/>
	<description>
	Integer overflow in the JAR unpacking utility (unpack200) in the unpack library (unpack.dll) in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows untrusted applications and applets to gain privileges via a Pack200 compressed JAR file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5353</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353" source="CVE"/>
	<description>
	The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5354</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5355</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5355" source="CVE"/>
	<description>
	The "Java Update" feature for Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not verify the signature of the JRE that is downloaded, which allows remote attackers to execute arbitrary code via DNS man-in-the-middle attacks.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5356</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356" source="CVE"/>
	<description>
	Heap-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5357</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357" source="CVE"/>
	<description>
	Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5358</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5358" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier might allow remote attackers to execute arbitrary code via a crafted GIF file that triggers memory corruption during display of the splash screen, possibly related to splashscreen.dll.
	</description>
 </metadata>
<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5359</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359" source="CVE"/>
	<description>
	Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5360</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier creates temporary files with predictable file names, which allows attackers to write malicious JAR files via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8671eb8081c281a0c30b3955c9f0a7b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033799" comment="IBMJava5-JRE less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033800" comment="IBMJava5-JRE less than 1.5.0-0.57"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033801" comment="IBMJava5-SDK less than 1.5.0-0.56"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033802" comment="IBMJava5-SDK less than 1.5.0-0.57"/>
		</criteria>
	</criteria>
	<!-- a0c79fc1ade46b252f8990bccc4821f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033803" comment="IBMJava2-JRE less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033804" comment="IBMJava2-JRE less than 1.4.2-0.139"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033805" comment="IBMJava2-SDK less than 1.4.2-0.133"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033806" comment="IBMJava2-SDK less than 1.4.2-0.139"/>
		</criteria>
	</criteria>
	<!-- f60c68e2df1e78d3d322957d0b5749a0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009031804" comment="java2-jre less than 1.4.2-129.48"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009031805" comment="java2 less than 1.4.2-129.48"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5500</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5503</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503" source="CVE"/>
	<description>
	The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5506</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5507</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5508</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5510</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510" source="CVE"/>
	<description>
	The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5511</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5512</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers."
	</description>
 </metadata>
<!-- 0e95b6241be3476dc7e25a19a51d3d48 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033891" comment="mozilla-calendar less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031992" comment="mozilla-cs less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031993" comment="mozilla-deat less than 1.8_seamonkey_1.0.4-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031994" comment="mozilla-devel less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031995" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031996" comment="mozilla-hu less than 1.80_seamonkey_1.0.4-11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031997" comment="mozilla-irc less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031999" comment="mozilla-mail less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032000" comment="mozilla-venkman less than 1.8_seamonkey_1.0.9-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032001" comment="mozilla less than 1.8_seamonkey_1.0.9-1.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5515</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b77636e704f15177c5f39b4f366e8e3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053722" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053723" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053724" comment="jakarta-tomcat-doc less than 5.0.19-29.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053725" comment="jakarta-tomcat-examples less than 5.0.19-29.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053726" comment="jakarta-tomcat less than 5.0.19-29.23"/>
		</criteria>
	</criteria>
	<!-- 4ffe53ac015a623326d3c0421a98e160 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059267" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059268" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059269" comment="jakarta-tomcat-doc less than 5.0.19-29.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059270" comment="jakarta-tomcat-examples less than 5.0.19-29.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059271" comment="jakarta-tomcat less than 5.0.19-29.25"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5557</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557" source="CVE"/>
	<description>
	Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.
	</description>
 </metadata>
<!-- 9ebcf4f7cac2d1384c060a0c4fe88bb4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033892" comment="apache-mod_php4 less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033893" comment="apache2-mod_php4 less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033894" comment="mod_php4-apache2 less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033895" comment="mod_php4-core less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033896" comment="mod_php4-servlet less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033897" comment="php4-bcmath less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033898" comment="php4-bz2 less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033899" comment="php4-calendar less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033900" comment="php4-ctype less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033901" comment="php4-curl less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033902" comment="php4-dba less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033903" comment="php4-dbase less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033904" comment="php4-devel less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033905" comment="php4-domxml less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033906" comment="php4-exif less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033907" comment="php4-fastcgi less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033908" comment="php4-filepro less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033909" comment="php4-ftp less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033910" comment="php4-gd less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033911" comment="php4-gettext less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033912" comment="php4-gmp less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033913" comment="php4-iconv less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033914" comment="php4-imap less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033915" comment="php4-ldap less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033916" comment="php4-mbstring less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033917" comment="php4-mcal less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033918" comment="php4-mcrypt less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033919" comment="php4-mhash less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033920" comment="php4-mime_magic less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033921" comment="php4-mysql less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033922" comment="php4-pear less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033923" comment="php4-pgsql less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033924" comment="php4-qtdom less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033925" comment="php4-readline less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033926" comment="php4-recode less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033927" comment="php4-session less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033928" comment="php4-shmop less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033929" comment="php4-snmp less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033930" comment="php4-sockets less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033931" comment="php4-swf less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033932" comment="php4-sysvsem less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033933" comment="php4-sysvshm less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033934" comment="php4-unixODBC less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033935" comment="php4-wddx less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033936" comment="php4-xslt less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033937" comment="php4-yp less than 4.3.4-43.91"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033938" comment="php4-zlib less than 4.3.4-43.91"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5824</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5824" source="CVE"/>
	<description>
	Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file.
	</description>
 </metadata>
<!-- 14bde6bb0a340384586047d3ae2cee19 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033939" comment="audiofile-32bit less than 9-200901211327"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032004" comment="audiofile-32bit less than 9-200901211334"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033940" comment="audiofile-64bit less than 9-200901211430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033941" comment="audiofile-x86 less than 9-200901211334"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032005" comment="audiofile less than 0.2.5-37.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5907</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5907" source="CVE"/>
	<description>
	The png_check_keyword function in pngwutil.c in libpng before 1.0.42, and 1.2.x before 1.2.34, might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords, related to an implicit cast of the '\0' character constant to a NULL pointer.  NOTE: some sources incorrectly report this as a double free vulnerability.
	</description>
 </metadata>
<!-- 8f88f45d1a609aeb3243992706c05fae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033942" comment="libpng-32bit less than 9-200901202353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032006" comment="libpng-32bit less than 9-200901202355"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033943" comment="libpng-64bit less than 9-200901202353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033944" comment="libpng-devel-64bit less than 9-200901202353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032007" comment="libpng-devel less than 1.2.5-182.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033945" comment="libpng-x86 less than 9-200901202355"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032008" comment="libpng less than 1.2.5-182.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6123</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-6123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123" source="CVE"/>
	<description>
	The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
	</description>
 </metadata>
<!-- 743455cf241c649b75edf49bbe932fcc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033946" comment="net-snmp-32bit less than 9-200906161409"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032009" comment="net-snmp-devel less than 5.1.3.1-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032010" comment="net-snmp less than 5.1.3.1-0.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032011" comment="perl-SNMP less than 5.1.3.1-0.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6218</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-6218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218" source="CVE"/>
	<description>
	Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.
	</description>
 </metadata>
<!-- eedf4535799480b79d05b758a184b9ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069808" comment="libpng-32bit less than 9-201108021633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069809" comment="libpng-32bit less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069810" comment="libpng-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069811" comment="libpng-devel-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069812" comment="libpng-devel less than 1.2.5-182.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069813" comment="libpng-x86 less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069814" comment="libpng less than 1.2.5-182.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6680</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-6680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680" source="CVE"/>
	<description>
	libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (crash) via a crafted EXE file that triggers a divide-by-zero error.
	</description>
 </metadata>
<!-- 605470d6c3708d88116d191521c4a9ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033947" comment="clamav less than 0.95-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2008-7247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
	<description>
	sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
	</description>
 </metadata>
<!-- ed744ae038fa991b8d68cfc1c5b0b76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064246" comment="mysql-Max less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064247" comment="mysql-client less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064248" comment="mysql-devel less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064249" comment="mysql-shared less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064250" comment="mysql less than 4.0.18-32.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0021</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021" source="CVE"/>
	<description>
	NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 446479f51e9e32eb8b7ebb60a54f19af -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032012" comment="xntp-doc less than 4.2.0a-23.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032013" comment="xntp less than 4.2.0a-23.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0025</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025" source="CVE"/>
	<description>
	BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 3c0305962976100c07f4b568bf3ed2f1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032014" comment="bind-devel less than 9.3.4-4.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033948" comment="bind-utils-32bit less than 9-200901120116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032015" comment="bind-utils-32bit less than 9-200901120120"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033949" comment="bind-utils-64bit less than 9-200901120119"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033950" comment="bind-utils-x86 less than 9-200901120120"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032016" comment="bind-utils less than 9.3.4-4.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032017" comment="bind less than 9.3.4-4.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0028</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028" source="CVE"/>
	<description>
	The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b700931e4ae8f2a03b1649edd2eda56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033951" comment="kernel-s390x-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033952" comment="kernel-s390x less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 5734912fdd1d59cddd357f791707416a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033953" comment="kernel-s390-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033954" comment="kernel-s390 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 673db0fba9a8a4f380391d496876b759 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033956" comment="kernel-um less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033958" comment="kernel-xenpae less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033959" comment="um-host-install-initrd less than 1.0-48.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033960" comment="um-host-kernel less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- b33c1669e547b2fb729dba29d5d0c433 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033961" comment="kernel-iseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033962" comment="kernel-pmac64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033963" comment="kernel-pseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- e29bce0eee4524e4bb8dfcf6de2c6699 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033964" comment="kernel-64k-pagesize less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033965" comment="kernel-sn2 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- eecc8d276b42eb926842d2839ea9afaf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0033</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
	</description>
 </metadata>
<!-- 2b77636e704f15177c5f39b4f366e8e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053722" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053723" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053724" comment="jakarta-tomcat-doc less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053725" comment="jakarta-tomcat-examples less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053726" comment="jakarta-tomcat less than 5.0.19-29.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
	<description>
	The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
	</description>
 </metadata>
<!-- d6e4b8fc031088598a536725879a803b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033966" comment="curl-32bit less than 9-200902201553"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032023" comment="curl-32bit less than 9-200902201554"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032024" comment="curl-devel less than 7.11.0-39.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032025" comment="curl less than 7.11.0-39.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
	<description>
	The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 55936f1f9c1a01f598b866e36a1be16a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033967" comment="libpng-32bit less than 9-200902171045"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032026" comment="libpng-32bit less than 9-200902171046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033968" comment="libpng-64bit less than 9-200902171045"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033969" comment="libpng-devel-64bit less than 9-200902171045"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032027" comment="libpng-devel less than 1.2.5-182.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033970" comment="libpng-x86 less than 9-200902171046"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032028" comment="libpng less than 1.2.5-182.22"/>
		</criteria>
	</criteria>
	<!-- b299db6da4726011dca881ce59bd99ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033971" comment="libpng-32bit less than 9-200902251713"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032029" comment="libpng-32bit less than 9-200902251715"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033972" comment="libpng-64bit less than 9-200902251712"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033973" comment="libpng-devel-64bit less than 9-200902251712"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032030" comment="libpng-devel less than 1.2.5-182.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033974" comment="libpng-x86 less than 9-200902251715"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032031" comment="libpng less than 1.2.5-182.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0065</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0065" source="CVE"/>
	<description>
	Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b700931e4ae8f2a03b1649edd2eda56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033951" comment="kernel-s390x-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033952" comment="kernel-s390x less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 5734912fdd1d59cddd357f791707416a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033953" comment="kernel-s390-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033954" comment="kernel-s390 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 673db0fba9a8a4f380391d496876b759 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033956" comment="kernel-um less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033958" comment="kernel-xenpae less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033959" comment="um-host-install-initrd less than 1.0-48.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033960" comment="um-host-kernel less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- b33c1669e547b2fb729dba29d5d0c433 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033961" comment="kernel-iseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033962" comment="kernel-pmac64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033963" comment="kernel-pseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- e29bce0eee4524e4bb8dfcf6de2c6699 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033964" comment="kernel-64k-pagesize less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033965" comment="kernel-sn2 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- eecc8d276b42eb926842d2839ea9afaf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0115</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0115" source="CVE"/>
	<description>
	The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
	</description>
 </metadata>
<!-- f1dfd5fdc667c28010289b15b2445d11 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032033" comment="multipath-tools less than 0.4.7-75.21"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0146</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0147</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" source="CVE"/>
	<description>
	Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
	<description>
	Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
	</description>
 </metadata>
<!-- b2abe13274d8a80c17f63140404ec31b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032039" comment="xntp-doc less than 4.2.0a-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032040" comment="xntp less than 4.2.0a-23.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
	<description>
	Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0165</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0166</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0179</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179" source="CVE"/>
	<description>
	libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
	</description>
 </metadata>
<!-- 639b367ae0bb9c20f36d43ad4161177e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033736" comment="libmikmod-32bit less than 9-200902271552"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031617" comment="libmikmod-32bit less than 9-200902271558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033737" comment="libmikmod-64bit less than 9-200902280719"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033738" comment="libmikmod-x86 less than 9-200902271558"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031618" comment="libmikmod less than 3.1.10-662.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0196</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196" source="CVE"/>
	<description>
	Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
	</description>
 </metadata>
<!-- c6678e67cf231f1f6438ecd15943042f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031619" comment="ghostscript-fonts-other less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031620" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031621" comment="ghostscript-fonts-std less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031622" comment="ghostscript-library less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031623" comment="ghostscript-serv less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031624" comment="ghostscript-x11 less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031625" comment="libgimpprint-devel less than 4.2.6-46.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031626" comment="libgimpprint less than 4.2.6-46.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
	<description>
	drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b700931e4ae8f2a03b1649edd2eda56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033951" comment="kernel-s390x-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033952" comment="kernel-s390x less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 5734912fdd1d59cddd357f791707416a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033953" comment="kernel-s390-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033954" comment="kernel-s390 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 673db0fba9a8a4f380391d496876b759 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033956" comment="kernel-um less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033958" comment="kernel-xenpae less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033959" comment="um-host-install-initrd less than 1.0-48.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033960" comment="um-host-kernel less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- b33c1669e547b2fb729dba29d5d0c433 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033961" comment="kernel-iseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033962" comment="kernel-pmac64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033963" comment="kernel-pseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- e29bce0eee4524e4bb8dfcf6de2c6699 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033964" comment="kernel-64k-pagesize less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033965" comment="kernel-sn2 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- eecc8d276b42eb926842d2839ea9afaf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0580</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
	</description>
 </metadata>
<!-- 2b77636e704f15177c5f39b4f366e8e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053722" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053723" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053724" comment="jakarta-tomcat-doc less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053725" comment="jakarta-tomcat-examples less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053726" comment="jakarta-tomcat less than 5.0.19-29.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0581</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0581" source="CVE"/>
	<description>
	Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.
	</description>
 </metadata>
<!-- 7ee19143f7b83e08401f5995abd73842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033978" comment="liblcms-32bit less than 9-200903091204"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032046" comment="liblcms-32bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033979" comment="liblcms-64bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032047" comment="liblcms-devel less than 1.12-55.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033980" comment="liblcms-x86 less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032048" comment="liblcms less than 1.12-55.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0583</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- fd792022866a1310fcb43b83ef8f4279 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032052" comment="ghostscript-fonts-other less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032053" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032054" comment="ghostscript-fonts-std less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032055" comment="ghostscript-library less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032056" comment="ghostscript-serv less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032057" comment="ghostscript-x11 less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032058" comment="libgimpprint-devel less than 4.2.6-46.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032059" comment="libgimpprint less than 4.2.6-46.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0584</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584" source="CVE"/>
	<description>
	icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- fd792022866a1310fcb43b83ef8f4279 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032052" comment="ghostscript-fonts-other less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032053" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032054" comment="ghostscript-fonts-std less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032055" comment="ghostscript-library less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032056" comment="ghostscript-serv less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032057" comment="ghostscript-x11 less than 7.07.1rc1-195.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032058" comment="libgimpprint-devel less than 4.2.6-46.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032059" comment="libgimpprint less than 4.2.6-46.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0585</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0585" source="CVE"/>
	<description>
	Integer overflow in the soup_base64_encode function in soup-misc.c in libsoup 2.x.x before 2.2.x, and 2.x before 2.24, allows context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation.
	</description>
 </metadata>
<!-- a31742f4610ed9fd83c14c2e81163a4b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032062" comment="libsoup-devel less than 2.2.3-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032063" comment="libsoup less than 2.2.3-0.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
	<description>
	The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
	</description>
 </metadata>
<!-- b8d3726c6ea3c28bc5ad72818e229fe7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032064" comment="openssl-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033981" comment="openssl-32bit less than 9-200904151549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033982" comment="openssl-64bit less than 9-200904151553"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032065" comment="openssl-devel-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033983" comment="openssl-devel-32bit less than 9-200904151549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033984" comment="openssl-devel-64bit less than 9-200904151553"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032066" comment="openssl-devel less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032067" comment="openssl-doc less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033985" comment="openssl-x86 less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032068" comment="openssl less than 0.9.7d-15.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0642</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0642" source="CVE"/>
	<description>
	ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0675</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0675" source="CVE"/>
	<description>
	The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an "inverted logic" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b700931e4ae8f2a03b1649edd2eda56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033951" comment="kernel-s390x-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033952" comment="kernel-s390x less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 5734912fdd1d59cddd357f791707416a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033953" comment="kernel-s390-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033954" comment="kernel-s390 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 673db0fba9a8a4f380391d496876b759 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033956" comment="kernel-um less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033958" comment="kernel-xenpae less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033959" comment="um-host-install-initrd less than 1.0-48.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033960" comment="um-host-kernel less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- b33c1669e547b2fb729dba29d5d0c433 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033961" comment="kernel-iseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033962" comment="kernel-pmac64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033963" comment="kernel-pseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- e29bce0eee4524e4bb8dfcf6de2c6699 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033964" comment="kernel-64k-pagesize less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033965" comment="kernel-sn2 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- eecc8d276b42eb926842d2839ea9afaf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0676</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676" source="CVE"/>
	<description>
	The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b700931e4ae8f2a03b1649edd2eda56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033951" comment="kernel-s390x-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033952" comment="kernel-s390x less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 5734912fdd1d59cddd357f791707416a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033953" comment="kernel-s390-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033954" comment="kernel-s390 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- 673db0fba9a8a4f380391d496876b759 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032022" comment="kernel-bigsmp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033956" comment="kernel-um less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033958" comment="kernel-xenpae less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033959" comment="um-host-install-initrd less than 1.0-48.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033960" comment="um-host-kernel less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- b33c1669e547b2fb729dba29d5d0c433 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033961" comment="kernel-iseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033962" comment="kernel-pmac64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033963" comment="kernel-pseries64 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- e29bce0eee4524e4bb8dfcf6de2c6699 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033964" comment="kernel-64k-pagesize less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033955" comment="kernel-debug less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033965" comment="kernel-sn2 less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
	<!-- eecc8d276b42eb926842d2839ea9afaf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032018" comment="kernel-default less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032019" comment="kernel-smp less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032020" comment="kernel-source less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032021" comment="kernel-syms less than 2.6.5-7.316"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033957" comment="kernel-xen less than 2.6.5-7.316"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
	<description>
	Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
	</description>
 </metadata>
<!-- 23d20e9712582451cefed986bb80ada8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033986" comment="cyrus-sasl-32bit less than 9-200905141643"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032069" comment="cyrus-sasl-32bit less than 9-200905141649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033987" comment="cyrus-sasl-64bit less than 9-200905141648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032070" comment="cyrus-sasl-crammd5 less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033988" comment="cyrus-sasl-devel-32bit less than 9-200905141643"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032071" comment="cyrus-sasl-devel-32bit less than 9-200905141649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033989" comment="cyrus-sasl-devel-64bit less than 9-200905141648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032072" comment="cyrus-sasl-devel less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032073" comment="cyrus-sasl-digestmd5 less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032074" comment="cyrus-sasl-gssapi less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032075" comment="cyrus-sasl-otp less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032076" comment="cyrus-sasl-plain less than 2.1.18-33.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033990" comment="cyrus-sasl-x86 less than 9-200905141649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032077" comment="cyrus-sasl less than 2.1.18-33.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0689</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689" source="CVE"/>
	<description>
	Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
		</criteria>
	</criteria>
	<!-- add72a13736156604035de7637b70fa1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056882" comment="kdelibs3-32bit less than 9-200912160015"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056898" comment="kdelibs3-32bit less than 9-200912160022"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056899" comment="kdelibs3-64bit less than 9-200912160050"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056883" comment="kdelibs3-devel-doc less than 3.2.1-44.77"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056884" comment="kdelibs3-devel less than 3.2.1-44.77"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056900" comment="kdelibs3-x86 less than 9-200912160015"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056885" comment="kdelibs3 less than 3.2.1-44.77"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0692</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692" source="CVE"/>
	<description>
	Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
	</description>
 </metadata>
<!-- ecae7b6a88e669baec4b55c8fb8d3b1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053392" comment="dhcp-client less than 3.0.1rc13-28.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
	<description>
	The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
	</description>
 </metadata>
<!-- ef44905c50fccb6ef9e2d8a87b14b8e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053616" comment="bind-devel less than 9.3.4-4.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053617" comment="bind-utils-32bit less than 9-200907291720"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053629" comment="bind-utils-64bit less than 9-200907291723"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053630" comment="bind-utils-x86 less than 9-200907291720"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053618" comment="bind-utils less than 9.3.4-4.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053619" comment="bind less than 9.3.4-4.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0723</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0723" source="CVE"/>
	<description>
	Multiple integer overflows in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 7ee19143f7b83e08401f5995abd73842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033978" comment="liblcms-32bit less than 9-200903091204"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032046" comment="liblcms-32bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033979" comment="liblcms-64bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032047" comment="liblcms-devel less than 1.12-55.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033980" comment="liblcms-x86 less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032048" comment="liblcms less than 1.12-55.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0733</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0733" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.
	</description>
 </metadata>
<!-- 7ee19143f7b83e08401f5995abd73842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009033978" comment="liblcms-32bit less than 9-200903091204"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032046" comment="liblcms-32bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033979" comment="liblcms-64bit less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032047" comment="liblcms-devel less than 1.12-55.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033980" comment="liblcms-x86 less than 9-200903091206"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032048" comment="liblcms less than 1.12-55.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0781</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
	</description>
 </metadata>
<!-- 2b77636e704f15177c5f39b4f366e8e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053722" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053723" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053724" comment="jakarta-tomcat-doc less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053725" comment="jakarta-tomcat-examples less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053726" comment="jakarta-tomcat less than 5.0.19-29.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0783</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
	</description>
 </metadata>
<!-- 2b77636e704f15177c5f39b4f366e8e3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053722" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053723" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053724" comment="jakarta-tomcat-doc less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053725" comment="jakarta-tomcat-examples less than 5.0.19-29.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053726" comment="jakarta-tomcat less than 5.0.19-29.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
	<description>
	OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
	</description>
 </metadata>
<!-- b8d3726c6ea3c28bc5ad72818e229fe7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032064" comment="openssl-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033981" comment="openssl-32bit less than 9-200904151549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033982" comment="openssl-64bit less than 9-200904151553"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032065" comment="openssl-devel-32bit less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033983" comment="openssl-devel-32bit less than 9-200904151549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033984" comment="openssl-devel-64bit less than 9-200904151553"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032066" comment="openssl-devel less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032067" comment="openssl-doc less than 0.9.7d-15.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033985" comment="openssl-x86 less than 9-200904151544"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032068" comment="openssl less than 0.9.7d-15.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0791</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" source="CVE"/>
	<description>
	Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
	</description>
 </metadata>
<!-- 2c00b2d6fa0957c52d2f1159ac07374a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032078" comment="cups-client less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032079" comment="cups-devel less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033991" comment="cups-libs-32bit less than 9-200906022330"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032080" comment="cups-libs-32bit less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033992" comment="cups-libs-64bit less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033993" comment="cups-libs-x86 less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032081" comment="cups-libs less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032082" comment="cups less than 1.1.20-108.61"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0792</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
	</description>
 </metadata>
<!-- c6678e67cf231f1f6438ecd15943042f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009031619" comment="ghostscript-fonts-other less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031620" comment="ghostscript-fonts-rus less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031621" comment="ghostscript-fonts-std less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031622" comment="ghostscript-library less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031623" comment="ghostscript-serv less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031624" comment="ghostscript-x11 less than 7.07.1rc1-195.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031625" comment="libgimpprint-devel less than 4.2.6-46.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009031626" comment="libgimpprint less than 4.2.6-46.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
	<description>
	Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0859</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0859" source="CVE"/>
	<description>
	The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 44f06b667195e8117d6bb191a31de5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033994" comment="kernel-s390-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033995" comment="kernel-s390 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 76e5e57de6307272db0ff310ec87c1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033996" comment="kernel-s390x-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033997" comment="kernel-s390x less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 7ba691449b5b522a31220b0c55f5e954 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033998" comment="kernel-iseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033999" comment="kernel-pmac64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034000" comment="kernel-pseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 8dd483721f3e24368457b8684991c59c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034002" comment="kernel-um less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034004" comment="kernel-xenpae less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034005" comment="um-host-install-initrd less than 1.0-48.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034006" comment="um-host-kernel less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- afc0a77961e126742a1b72868508d13e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034007" comment="kernel-64k-pagesize less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034008" comment="kernel-sn2 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- da42ab1c030899314548fc2b5e5fbf9b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0922</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0922" source="CVE"/>
	<description>
	PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests.
	</description>
 </metadata>
<!-- 1827efe0d587f1f3f8733b41d4902ca5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032088" comment="postgresql-contrib less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032089" comment="postgresql-devel less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032090" comment="postgresql-docs less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034009" comment="postgresql-libs-32bit less than 9-200903241519"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032091" comment="postgresql-libs-32bit less than 9-200903241522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034010" comment="postgresql-libs-64bit less than 9-200903241530"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034011" comment="postgresql-libs-x86 less than 9-200903241522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032092" comment="postgresql-libs less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032093" comment="postgresql-server less than 7.4.25-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032094" comment="postgresql less than 7.4.25-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
	<description>
	Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
	</description>
 </metadata>
<!-- 7309faad573b368d279344c54e639826 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032095" comment="freetype2-32bit less than 9-200904162346"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034012" comment="freetype2-32bit less than 9-200904170004"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034013" comment="freetype2-64bit less than 9-200904170054"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032096" comment="freetype2-devel-32bit less than 9-200904162346"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034014" comment="freetype2-devel-32bit less than 9-200904170004"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034015" comment="freetype2-devel-64bit less than 9-200904170054"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032097" comment="freetype2-devel less than 2.1.7-53.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034016" comment="freetype2-x86 less than 9-200904162346"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032098" comment="freetype2 less than 2.1.7-53.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0949</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-0949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0949" source="CVE"/>
	<description>
	The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
	</description>
 </metadata>
<!-- 2c00b2d6fa0957c52d2f1159ac07374a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032078" comment="cups-client less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032079" comment="cups-devel less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033991" comment="cups-libs-32bit less than 9-200906022330"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032080" comment="cups-libs-32bit less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033992" comment="cups-libs-64bit less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033993" comment="cups-libs-x86 less than 9-200906022331"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032081" comment="cups-libs less than 1.1.20-108.61"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032082" comment="cups less than 1.1.20-108.61"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1072</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072" source="CVE"/>
	<description>
	nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 44f06b667195e8117d6bb191a31de5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033994" comment="kernel-s390-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033995" comment="kernel-s390 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 76e5e57de6307272db0ff310ec87c1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033996" comment="kernel-s390x-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033997" comment="kernel-s390x less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 7ba691449b5b522a31220b0c55f5e954 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033998" comment="kernel-iseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033999" comment="kernel-pmac64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034000" comment="kernel-pseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 8dd483721f3e24368457b8684991c59c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034002" comment="kernel-um less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034004" comment="kernel-xenpae less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034005" comment="um-host-install-initrd less than 1.0-48.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034006" comment="um-host-kernel less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- afc0a77961e126742a1b72868508d13e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034007" comment="kernel-64k-pagesize less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034008" comment="kernel-sn2 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- da42ab1c030899314548fc2b5e5fbf9b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1093</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093" source="CVE"/>
	<description>
	LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1094</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1095</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095" source="CVE"/>
	<description>
	Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1096</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096" source="CVE"/>
	<description>
	Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1098</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098" source="CVE"/>
	<description>
	Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1099</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099" source="CVE"/>
	<description>
	Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1100</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13fd47e75aabf7df1c83474ce67cc3e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056372" comment="IBMJava2-JRE less than 1.4.2_sr13.2-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056373" comment="IBMJava2-SDK less than 1.4.2_sr13.2-0.7"/>
		</criteria>
	</criteria>
	<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1103</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1104</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331.  NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1107</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
	</description>
 </metadata>
<!-- 316bc2ba25f95569ad6a7c96e77f903c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009034017" comment="IBMJava5-JRE less than 1.5.0-0.64"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034018" comment="IBMJava5-SDK less than 1.5.0-0.64"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
	<description>
	The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
	</description>
 </metadata>
<!-- 403675f837530f047eb825dcb7428cf3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032034" comment="cups-client less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032035" comment="cups-devel less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032036" comment="cups-libs-32bit less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033975" comment="cups-libs-32bit less than 9-200904161506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033976" comment="cups-libs-64bit less than 9-200904161924"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033977" comment="cups-libs-x86 less than 9-200904161449"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032037" comment="cups-libs less than 1.1.20-108.58"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032038" comment="cups less than 1.1.20-108.58"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1192</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192" source="CVE"/>
	<description>
	The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1194</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194" source="CVE"/>
	<description>
	Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
	</description>
 </metadata>
<!-- 2ed597e05108e56695e9a6f3e054c812 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057914" comment="pango-32bit less than 9-201001271537"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057915" comment="pango-32bit less than 9-201001271539"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057916" comment="pango-64bit less than 9-201001271549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057917" comment="pango-devel-64bit less than 9-201001271549"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057918" comment="pango-devel less than 1.2.5-174.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057919" comment="pango-doc less than 1.2.5-174.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057920" comment="pango-x86 less than 9-201001271537"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057921" comment="pango less than 1.2.5-174.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
	<description>
	Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- a9de6cdcda6b72f3f880e5ae0db7d27d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034019" comment="ethereal less than 0.10.13-2.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1241</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241" source="CVE"/>
	<description>
	Unspecified vulnerability in ClamAV before 0.95 allows remote attackers to bypass detection of malware via a modified RAR archive.
	</description>
 </metadata>
<!-- 605470d6c3708d88116d191521c4a9ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033947" comment="clamav less than 0.95-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
	<description>
	Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
	</description>
 </metadata>
<!-- b2abe13274d8a80c17f63140404ec31b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032039" comment="xntp-doc less than 4.2.0a-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032040" comment="xntp less than 4.2.0a-23.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1265</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1265" source="CVE"/>
	<description>
	Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 44f06b667195e8117d6bb191a31de5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033994" comment="kernel-s390-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033995" comment="kernel-s390 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 76e5e57de6307272db0ff310ec87c1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033996" comment="kernel-s390x-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033997" comment="kernel-s390x less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 7ba691449b5b522a31220b0c55f5e954 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033998" comment="kernel-iseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033999" comment="kernel-pmac64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034000" comment="kernel-pseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 8dd483721f3e24368457b8684991c59c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034002" comment="kernel-um less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034004" comment="kernel-xenpae less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034005" comment="um-host-install-initrd less than 1.0-48.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034006" comment="um-host-kernel less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- afc0a77961e126742a1b72868508d13e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034007" comment="kernel-64k-pagesize less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034008" comment="kernel-sn2 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- da42ab1c030899314548fc2b5e5fbf9b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1266</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark before 1.0.7-0.1-1 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- a9de6cdcda6b72f3f880e5ae0db7d27d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034019" comment="ethereal less than 0.10.13-2.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
	</description>
 </metadata>
<!-- a9de6cdcda6b72f3f880e5ae0db7d27d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034019" comment="ethereal less than 0.10.13-2.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
	<description>
	The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
	</description>
 </metadata>
<!-- a9de6cdcda6b72f3f880e5ae0db7d27d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034019" comment="ethereal less than 0.10.13-2.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
	</description>
 </metadata>
<!-- a9de6cdcda6b72f3f880e5ae0db7d27d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034019" comment="ethereal less than 0.10.13-2.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1270</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270" source="CVE"/>
	<description>
	libclamav/untar.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (infinite loop) via a crafted TAR file that causes (1) clamd and (2) clamscan to hang.
	</description>
 </metadata>
<!-- 605470d6c3708d88116d191521c4a9ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033947" comment="clamav less than 0.95-1.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
	<description>
	The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1337</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337" source="CVE"/>
	<description>
	The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 44f06b667195e8117d6bb191a31de5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033994" comment="kernel-s390-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033995" comment="kernel-s390 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 76e5e57de6307272db0ff310ec87c1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033996" comment="kernel-s390x-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033997" comment="kernel-s390x less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 7ba691449b5b522a31220b0c55f5e954 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033998" comment="kernel-iseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033999" comment="kernel-pmac64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034000" comment="kernel-pseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 8dd483721f3e24368457b8684991c59c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034002" comment="kernel-um less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034004" comment="kernel-xenpae less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034005" comment="um-host-install-initrd less than 1.0-48.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034006" comment="um-host-kernel less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- afc0a77961e126742a1b72868508d13e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034007" comment="kernel-64k-pagesize less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034008" comment="kernel-sn2 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- da42ab1c030899314548fc2b5e5fbf9b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1385</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1385" source="CVE"/>
	<description>
	Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1389</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389" source="CVE"/>
	<description>
	Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 2848c72cdea6773ec3fca34ab8d603f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054246" comment="kernel-s390-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054247" comment="kernel-s390 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 55cf7e0138fcbca7a1651ad458a632e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054248" comment="kernel-xen less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 8915bab99f61e8786e7380572eafc564 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054249" comment="kernel-64k-pagesize less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054250" comment="kernel-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054251" comment="kernel-sn2 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 9fc9d5258b53f25591d7a961da953e46 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054252" comment="kernel-iseries64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054253" comment="kernel-pmac64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054254" comment="kernel-pseries64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- b40d3b95941615ddd4f068e6cb284779 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054255" comment="kernel-s390x-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054256" comment="kernel-s390x less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- e7b08bc6afb9365905c3fb54c11bd6e3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054257" comment="kernel-bigsmp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054250" comment="kernel-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054258" comment="kernel-um less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054248" comment="kernel-xen less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054259" comment="kernel-xenpae less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054260" comment="um-host-install-initrd less than 1.0-48.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054261" comment="um-host-kernel less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1392</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3 before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) nsEventStateManager::GetContentState and nsNativeTheme::CheckBooleanAttr; (2) UnhookTextRunFromFrames and ClearAllTextRunReferences; (3) nsTextFrame::ClearTextRun; (4) IsPercentageAware; (5) PL_DHashTableFinish; (6) nsListBoxBodyFrame::GetNextItemBox; (7) AtomTableClearEntry, related to the atom table, DOM mutation events, and Unicode surrogates; (8) nsHTMLEditor::HideResizers; and (9) nsWindow::SetCursor, related to changing the cursor; and other vectors.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1439</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439" source="CVE"/>
	<description>
	Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 44f06b667195e8117d6bb191a31de5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033994" comment="kernel-s390-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033995" comment="kernel-s390 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 76e5e57de6307272db0ff310ec87c1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033996" comment="kernel-s390x-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033997" comment="kernel-s390x less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 7ba691449b5b522a31220b0c55f5e954 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033998" comment="kernel-iseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033999" comment="kernel-pmac64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034000" comment="kernel-pseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 8dd483721f3e24368457b8684991c59c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034002" comment="kernel-um less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034004" comment="kernel-xenpae less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034005" comment="um-host-install-initrd less than 1.0-48.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034006" comment="um-host-kernel less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- afc0a77961e126742a1b72868508d13e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034007" comment="kernel-64k-pagesize less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034008" comment="kernel-sn2 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- da42ab1c030899314548fc2b5e5fbf9b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1572</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1572" source="CVE"/>
	<description>
	The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error.
	</description>
 </metadata>
<!-- 1ac498a4883057b3379b1e7598e4e3b8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034020" comment="quagga less than 0.99.7-11.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1632</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632" source="CVE"/>
	<description>
	Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.
	</description>
 </metadata>
<!-- 8a08624865a04404e34f236d2417fa5a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009032102" comment="ipsec-tools less than 0.3.3-1.17"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1633</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1633" source="CVE"/>
	<description>
	Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 44f06b667195e8117d6bb191a31de5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033994" comment="kernel-s390-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033995" comment="kernel-s390 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 76e5e57de6307272db0ff310ec87c1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009033996" comment="kernel-s390x-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033997" comment="kernel-s390x less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 7ba691449b5b522a31220b0c55f5e954 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033998" comment="kernel-iseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009033999" comment="kernel-pmac64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034000" comment="kernel-pseries64 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8dd483721f3e24368457b8684991c59c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032087" comment="kernel-bigsmp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034002" comment="kernel-um less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034004" comment="kernel-xenpae less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034005" comment="um-host-install-initrd less than 1.0-48.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034006" comment="um-host-kernel less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- afc0a77961e126742a1b72868508d13e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009034007" comment="kernel-64k-pagesize less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034001" comment="kernel-debug less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034008" comment="kernel-sn2 less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- da42ab1c030899314548fc2b5e5fbf9b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009032083" comment="kernel-default less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032084" comment="kernel-smp less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032085" comment="kernel-source less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009032086" comment="kernel-syms less than 2.6.5-7.317"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009034003" comment="kernel-xen less than 2.6.5-7.317"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1758</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1758" source="CVE"/>
	<description>
	The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2848c72cdea6773ec3fca34ab8d603f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054246" comment="kernel-s390-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054247" comment="kernel-s390 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 55cf7e0138fcbca7a1651ad458a632e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054248" comment="kernel-xen less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 8915bab99f61e8786e7380572eafc564 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054249" comment="kernel-64k-pagesize less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054250" comment="kernel-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054251" comment="kernel-sn2 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 9fc9d5258b53f25591d7a961da953e46 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054252" comment="kernel-iseries64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054253" comment="kernel-pmac64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054254" comment="kernel-pseries64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- b40d3b95941615ddd4f068e6cb284779 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054255" comment="kernel-s390x-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054256" comment="kernel-s390x less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- e7b08bc6afb9365905c3fb54c11bd6e3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054257" comment="kernel-bigsmp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054250" comment="kernel-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054258" comment="kernel-um less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054248" comment="kernel-xen less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054259" comment="kernel-xenpae less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054260" comment="um-host-install-initrd less than 1.0-48.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054261" comment="um-host-kernel less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1829</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829" source="CVE"/>
	<description>
	Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets.
	</description>
 </metadata>
<!-- a9de6cdcda6b72f3f880e5ae0db7d27d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009034019" comment="ethereal less than 0.10.13-2.41"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1832</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1832" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors involving "double frame construction."
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1833</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) js_LeaveSharpObject, (2) ParseXMLSource, and (3) a certain assertion in jsinterp.c; and other vectors.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1835</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11 and SeaMonkey before 1.1.17 associate local documents with external domain names located after the file:// substring in a URL, which allows user-assisted remote attackers to read arbitrary cookies via a crafted HTML document, as demonstrated by a URL with file://example.com/C:/ at the beginning.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1836</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 use the HTTP Host header to determine the context of a document provided in a non-200 CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1838</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838" source="CVE"/>
	<description>
	The garbage-collection implementation in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 sets an element's owner document to null in unspecified circumstances, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via a crafted event handler, related to an incorrect context for this event handler.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1841</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841" source="CVE"/>
	<description>
	js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.17 allows remote attackers to execute arbitrary web script with the privileges of a chrome object, as demonstrated by the browser sidebar and the FeedWriter.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1883</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1883" source="CVE"/>
	<description>
	The z90crypt_unlocked_ioctl function in the z90crypt driver in the Linux kernel 2.6.9 does not perform a capability check for the Z90QUIESCE operation, which allows local users to leverage euid 0 privileges to force a driver outage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
	<description>
	The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055712" comment="apache2-devel less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055713" comment="apache2-doc less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055714" comment="apache2-example-pages less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055715" comment="apache2-prefork less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055716" comment="apache2-worker less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055717" comment="apache2 less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
	<description>
	The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055712" comment="apache2-devel less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055713" comment="apache2-doc less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055714" comment="apache2-example-pages less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055715" comment="apache2-prefork less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055716" comment="apache2-worker less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055717" comment="apache2 less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1904</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904" source="CVE"/>
	<description>
	The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
	</description>
 </metadata>
<!-- bf0b463c573238d140dbff3b8165ac7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053391" comment="ruby less than 1.8.1-42.27"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1955</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955" source="CVE"/>
	<description>
	The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
	</description>
 </metadata>
<!-- 05b1c8b142edc2f6eb7574b4ae7cb777 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060052" comment="apache2-devel less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060053" comment="apache2-doc less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060054" comment="apache2-example-pages less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060055" comment="apache2-prefork less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060056" comment="apache2-worker less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060057" comment="apache2 less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060058" comment="libapr0 less than 2.0.59-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2042</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042" source="CVE"/>
	<description>
	libpng before 1.2.37 does not properly parse 1-bit interlaced images with width values that are not divisible by 8, which causes libpng to include uninitialized bits in certain rows of a PNG file and might allow remote attackers to read portions of sensitive memory via "out-of-bounds pixels" in the file.
	</description>
 </metadata>
<!-- 67857e8f88bfae31d2ef83807ef7998a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053352" comment="libpng-32bit less than 9-200906232031"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053358" comment="libpng-32bit less than 9-200906232032"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053359" comment="libpng-64bit less than 9-200906232029"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053360" comment="libpng-devel-64bit less than 9-200906232029"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053353" comment="libpng-devel less than 1.2.5-182.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053361" comment="libpng-x86 less than 9-200906232031"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053354" comment="libpng less than 1.2.5-182.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2185</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2185" source="CVE"/>
	<description>
	The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 before 2.8.10, 4.2 before 4.2.16, and 4.3 before 4.3.2; and (b) openSwan 2.6 before 2.6.22 and 2.4 before 2.4.15 allows remote attackers to cause a denial of service (pluto IKE daemon crash) via an X.509 certificate with (1) crafted Relative Distinguished Names (RDNs), (2) a crafted UTCTIME string, or (3) a crafted GENERALIZEDTIME string.
	</description>
 </metadata>
<!-- ab576f19b311be636b2a279b8ba60205 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053444" comment="freeswan less than 2.04_1.5.4-1.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2210</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2210" source="CVE"/>
	<description>
	Mozilla Thunderbird before 2.0.0.22 and SeaMonkey before 1.1.17 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a multipart/alternative e-mail message containing a text/enhanced part that triggers access to an incorrect object type.
	</description>
 </metadata>
<!-- 5d24f63b529c9385be7c0651c0b296aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055123" comment="mozilla-devel less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055124" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055125" comment="mozilla-irc less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055126" comment="mozilla-mail less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055127" comment="mozilla-venkman less than 1.8_seamonkey_1.1.17-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055128" comment="mozilla less than 1.8_seamonkey_1.1.17-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
	<description>
	Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
	</description>
 </metadata>
<!-- 260a237893413716f08c94b6e09cdff7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053717" comment="libtiff-32bit less than 9-200904061139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053727" comment="libtiff-32bit less than 9-200904061900"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053728" comment="libtiff-64bit less than 9-200904061620"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053729" comment="libtiff-x86 less than 9-200904061139"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053718" comment="libtiff less than 3.6.1-38.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
	<description>
	Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
	</description>
 </metadata>
<!-- 3e13d9abb5b97c10f372ea9f4973e4ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054047" comment="libtiff-32bit less than 9-200908071506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054053" comment="libtiff-64bit less than 9-200908071517"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054054" comment="libtiff-x86 less than 9-200908071506"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054048" comment="libtiff less than 3.6.1-38.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2404</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404" source="CVE"/>
	<description>
	Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
	</description>
 </metadata>
<!-- 0544b892a9b723761a105daea14175d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055386" comment="mozilla-devel less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055387" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055388" comment="mozilla-irc less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055389" comment="mozilla-mail less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055390" comment="mozilla-venkman less than 1.8_seamonkey_1.1.18-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055391" comment="mozilla less than 1.8_seamonkey_1.1.18-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2408</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0544b892a9b723761a105daea14175d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055386" comment="mozilla-devel less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055387" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055388" comment="mozilla-irc less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055389" comment="mozilla-mail less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055390" comment="mozilla-venkman less than 1.8_seamonkey_1.1.18-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055391" comment="mozilla less than 1.8_seamonkey_1.1.18-0.1"/>
		</criteria>
	</criteria>
	<!-- 754c6c7cea03a8f586e6f3936262dbfe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054892" comment="openldap2-back-ldap less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054893" comment="openldap2-back-meta less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054894" comment="openldap2-back-monitor less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054895" comment="openldap2-back-perl less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054896" comment="openldap2-client-32bit less than 9-200909091106"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054912" comment="openldap2-client-32bit less than 9-200909091129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054913" comment="openldap2-client-64bit less than 9-200909091107"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054914" comment="openldap2-client-x86 less than 9-200909091106"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054897" comment="openldap2-client less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054898" comment="openldap2-devel-32bit less than 9-200909091106"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054915" comment="openldap2-devel-32bit less than 9-200909091129"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054916" comment="openldap2-devel-64bit less than 9-200909091107"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054899" comment="openldap2-devel less than 2.2.24-4.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054900" comment="openldap2 less than 2.2.24-4.31"/>
		</criteria>
	</criteria>
	<!-- b86cc89c72cf739801e5261d7bfc8078 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054901" comment="mutt less than 1.5.6i-64.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
	<description>
	Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 05b1c8b142edc2f6eb7574b4ae7cb777 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060052" comment="apache2-devel less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060053" comment="apache2-doc less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060054" comment="apache2-example-pages less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060055" comment="apache2-prefork less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060056" comment="apache2-worker less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060057" comment="apache2 less than 2.0.59-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060058" comment="libapr0 less than 2.0.59-1.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2414</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414" source="CVE"/>
	<description>
	Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- e93f02978275ac1e51c88cdd7945ac87 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054814" comment="libxml-32bit less than 9-200909081613"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054810" comment="libxml-32bit less than 9-200909081614"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054815" comment="libxml-64bit less than 9-200909081614"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054811" comment="libxml-devel less than 1.8.17-366.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054816" comment="libxml-x86 less than 9-200909081614"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054812" comment="libxml less than 1.8.17-366.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2416</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- cd682b76a96c81f1df2df19ce908b7fa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053785" comment="libxml2-32bit less than 9-200908071404"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053774" comment="libxml2-32bit less than 9-200908071409"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053786" comment="libxml2-64bit less than 9-200908071407"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053775" comment="libxml2-devel less than 2.6.7-28.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053787" comment="libxml2-x86 less than 9-200908071409"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053776" comment="libxml2 less than 2.6.7-28.22"/>
		</criteria>
	</criteria>
	<!-- e93f02978275ac1e51c88cdd7945ac87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054814" comment="libxml-32bit less than 9-200909081613"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054810" comment="libxml-32bit less than 9-200909081614"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054815" comment="libxml-64bit less than 9-200909081614"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054811" comment="libxml-devel less than 1.8.17-366.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054816" comment="libxml-x86 less than 9-200909081614"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054812" comment="libxml less than 1.8.17-366.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
	<description>
	lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 791924517c3765796e43ae44ca0e92db -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053906" comment="curl-32bit less than 9-200908071403"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053893" comment="curl-32bit less than 9-200908071408"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053894" comment="curl-devel less than 7.11.0-39.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053895" comment="curl less than 7.11.0-39.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2446</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2446" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 877515d582920d4f52d3e647af5b2d42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054280" comment="mysql-Max less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054282" comment="mysql-client less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054283" comment="mysql-devel less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054284" comment="mysql-shared less than 4.0.18-32.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054285" comment="mysql less than 4.0.18-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2463</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) PL_Base64Decode and (2) PL_Base64Encode functions in nsprpub/lib/libc/src/base64.c in Mozilla Firefox before 3.0.12, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors that trigger buffer overflows.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2493</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."
	</description>
 </metadata>
<!-- bef414c897666b4530c787e16bbc7146 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2560</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
	</description>
 </metadata>
<!-- 8bfa090611f2f19ae85d5e1618353f30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056418" comment="ethereal less than 0.10.13-2.45"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2562</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562" source="CVE"/>
	<description>
	Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- f8ae21ffd223d459911584fb7b9d4df4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054499" comment="ethereal less than 0.10.13-2.43"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2563</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Infiniband dissector in Wireshark 1.0.6 through 1.2.0, when running on unspecified platforms, allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 4ef381e218bf053815671136afe34cca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058845" comment="ethereal less than 0.10.13-2.47"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2621</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2621" source="CVE"/>
	<description>
	Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.
	</description>
 </metadata>
<!-- 53d90d0dfc7cde3766b576a0e039dfa4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059036" comment="squid less than 2.5.STABLE5-42.56"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2622</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2622" source="CVE"/>
	<description>
	Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 allows remote attackers to cause a denial of service via malformed requests including (1) "missing or mismatched protocol identifier," (2) missing or negative status value," (3) "missing version," or (4) "missing or invalid status number," related to (a) HttpMsg.cc and (b) HttpReply.cc.
	</description>
 </metadata>
<!-- 53d90d0dfc7cde3766b576a0e039dfa4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059036" comment="squid less than 2.5.STABLE5-42.56"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
	<description>
	XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2374aacdecd5903ec58f895da571c312 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060340" comment="python-32bit less than 9-201003231321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060341" comment="python-32bit less than 9-201003231557"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060342" comment="python-64bit less than 9-201003232314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060343" comment="python-curses less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060344" comment="python-demo less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060345" comment="python-devel less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060346" comment="python-doc-pdf less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060347" comment="python-doc less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060348" comment="python-gdbm less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060349" comment="python-idle less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060350" comment="python-mpz less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060351" comment="python-tk less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060352" comment="python-x86 less than 9-201003231321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060353" comment="python-xml less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060354" comment="python less than 2.3.3-88.28"/>
		</criteria>
	</criteria>
	<!-- a0b842a1b609cf999c2eadc5c3204e4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054394" comment="IBMJava5-JRE less than 1.5.0-0.70"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054395" comment="IBMJava5-JRE less than 1.5.0-0.71"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054396" comment="IBMJava5-SDK less than 1.5.0-0.70"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054397" comment="IBMJava5-SDK less than 1.5.0-0.71"/>
		</criteria>
	</criteria>
	<!-- ad0c25eb89a44da32530ce951773f390 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060885" comment="xmlrpc-c-devel less than 0.9.10-21.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060886" comment="xmlrpc-c less than 0.9.10-21.5"/>
		</criteria>
	</criteria>
	<!-- d1b1f4c96c547a1f3e96c305d4055d6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055088" comment="IBMJava2-JRE less than 1.4.2-0.144"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055089" comment="IBMJava2-JRE less than 1.4.2-0.146"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055090" comment="IBMJava2-SDK less than 1.4.2-0.144"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055091" comment="IBMJava2-SDK less than 1.4.2-0.146"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2632</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2632" source="CVE"/>
	<description>
	Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
	</description>
 </metadata>
<!-- 6bab3e180da69d52479ace00e1a3ef0c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064556" comment="cyrus-imapd-devel less than 2.2.3-83.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064557" comment="cyrus-imapd less than 2.2.3-83.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064554" comment="perl-Cyrus-IMAP less than 2.2.3-83.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064555" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.3-83.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2661</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2661" source="CVE"/>
	<description>
	The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data.  NOTE: this is due to an incomplete fix for CVE-2009-2185.
	</description>
 </metadata>
<!-- df2b61aaee7dbf9f02125d6c45ecd3e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055011" comment="freeswan less than 2.04_1.5.4-1.28"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2663</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663" source="CVE"/>
	<description>
	libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
	</description>
 </metadata>
<!-- cb3804396174aaa13497fdc3ccd0dd2b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061094" comment="libvorbis-32bit less than 9-201005281006"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061095" comment="libvorbis-32bit less than 9-201005281010"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061096" comment="libvorbis-64bit less than 9-201005281008"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061097" comment="libvorbis-devel less than 1.0.1-56.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061098" comment="libvorbis-x86 less than 9-201005281010"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061099" comment="libvorbis less than 1.0.1-56.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
	<description>
	socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 9c3bb10a98ea11a0ee67cc9bac8eca71 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053777" comment="fetchmail less than 6.2.5-49.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053778" comment="fetchmailconf less than 6.2.5-49.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2670</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2670" source="CVE"/>
	<description>
	The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
	</description>
 </metadata>
<!-- a0b842a1b609cf999c2eadc5c3204e4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054394" comment="IBMJava5-JRE less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054395" comment="IBMJava5-JRE less than 1.5.0-0.71"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054396" comment="IBMJava5-SDK less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054397" comment="IBMJava5-SDK less than 1.5.0-0.71"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2671</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2671" source="CVE"/>
	<description>
	The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
	</description>
 </metadata>
<!-- a0b842a1b609cf999c2eadc5c3204e4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054394" comment="IBMJava5-JRE less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054395" comment="IBMJava5-JRE less than 1.5.0-0.71"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054396" comment="IBMJava5-SDK less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054397" comment="IBMJava5-SDK less than 1.5.0-0.71"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2672</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2672" source="CVE"/>
	<description>
	The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
	</description>
 </metadata>
<!-- a0b842a1b609cf999c2eadc5c3204e4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054394" comment="IBMJava5-JRE less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054395" comment="IBMJava5-JRE less than 1.5.0-0.71"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054396" comment="IBMJava5-SDK less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054397" comment="IBMJava5-SDK less than 1.5.0-0.71"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2673</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2673" source="CVE"/>
	<description>
	The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
	</description>
 </metadata>
<!-- a0b842a1b609cf999c2eadc5c3204e4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054394" comment="IBMJava5-JRE less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054395" comment="IBMJava5-JRE less than 1.5.0-0.71"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054396" comment="IBMJava5-SDK less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054397" comment="IBMJava5-SDK less than 1.5.0-0.71"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2675</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2675" source="CVE"/>
	<description>
	Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
	</description>
 </metadata>
<!-- a0b842a1b609cf999c2eadc5c3204e4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054394" comment="IBMJava5-JRE less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054395" comment="IBMJava5-JRE less than 1.5.0-0.71"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054396" comment="IBMJava5-SDK less than 1.5.0-0.70"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054397" comment="IBMJava5-SDK less than 1.5.0-0.71"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2692</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692" source="CVE"/>
	<description>
	The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2848c72cdea6773ec3fca34ab8d603f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054246" comment="kernel-s390-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054247" comment="kernel-s390 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 55cf7e0138fcbca7a1651ad458a632e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054248" comment="kernel-xen less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 8915bab99f61e8786e7380572eafc564 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054249" comment="kernel-64k-pagesize less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054250" comment="kernel-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054251" comment="kernel-sn2 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- 9fc9d5258b53f25591d7a961da953e46 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054252" comment="kernel-iseries64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054253" comment="kernel-pmac64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054254" comment="kernel-pseries64 less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- b40d3b95941615ddd4f068e6cb284779 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054255" comment="kernel-s390x-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054256" comment="kernel-s390x less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
	<!-- e7b08bc6afb9365905c3fb54c11bd6e3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054257" comment="kernel-bigsmp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054250" comment="kernel-debug less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054242" comment="kernel-default less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054243" comment="kernel-smp less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054244" comment="kernel-source less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054245" comment="kernel-syms less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054258" comment="kernel-um less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054248" comment="kernel-xen less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054259" comment="kernel-xenpae less than 2.6.5-7.318"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054260" comment="um-host-install-initrd less than 1.0-48.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054261" comment="um-host-kernel less than 2.6.5-7.318"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2693</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
	</description>
 </metadata>
<!-- 4ffe53ac015a623326d3c0421a98e160 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059267" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059268" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059269" comment="jakarta-tomcat-doc less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059270" comment="jakarta-tomcat-examples less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059271" comment="jakarta-tomcat less than 5.0.19-29.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2698</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698" source="CVE"/>
	<description>
	The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b7f44ba0b74dd47aefb66d029aee22 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054428" comment="kernel-64k-pagesize less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054429" comment="kernel-debug less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054423" comment="kernel-default less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054430" comment="kernel-sn2 less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
	<!-- 23075fdb753a73d1780a3004b9b7fca5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054423" comment="kernel-default less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054424" comment="kernel-smp less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054431" comment="kernel-xen less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
	<!-- 79ef08ffce3f7d36bd9fd53abcb0ee3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054423" comment="kernel-default less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054432" comment="kernel-iseries64 less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054433" comment="kernel-pmac64 less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054434" comment="kernel-pseries64 less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054424" comment="kernel-smp less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
	<!-- d063f1bcc5b71a074a58bf7132bb8eb5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054435" comment="kernel-s390x-debug less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054436" comment="kernel-s390x less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
	<!-- f070d6bd439f3d1847adcd7acb4805c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054437" comment="kernel-s390-debug less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054438" comment="kernel-s390 less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
	<!-- f3cf1d681af46868ff53e2759abdd656 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054427" comment="kernel-bigsmp less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054429" comment="kernel-debug less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054423" comment="kernel-default less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054424" comment="kernel-smp less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054425" comment="kernel-source less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054426" comment="kernel-syms less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054439" comment="kernel-um less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054431" comment="kernel-xen less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054440" comment="kernel-xenpae less than 2.6.5-7.319"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054441" comment="um-host-install-initrd less than 1.0-48.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054442" comment="um-host-kernel less than 2.6.5-7.319"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2730</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2730" source="CVE"/>
	<description>
	libgnutls in GnuTLS before 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
<!-- a1d0a89cbe45ec5bf66a0631d904ff80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054779" comment="gnutls-devel less than 1.0.8-26.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054780" comment="gnutls less than 1.0.8-26.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
	<description>
	Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
	</description>
 </metadata>
<!-- ee2dec24f34e3c2a80e8b4b4aee42488 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055501" comment="libsmbclient-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055460" comment="libsmbclient-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055502" comment="libsmbclient-64bit less than 9-200910020935"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055461" comment="libsmbclient-devel less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055462" comment="libsmbclient less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055503" comment="samba-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055463" comment="samba-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055504" comment="samba-client-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055464" comment="samba-client-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055465" comment="samba-client less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055466" comment="samba-doc less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055467" comment="samba-pdb less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055468" comment="samba-python less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055469" comment="samba-vscan less than 0.3.6b-0.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055505" comment="samba-winbind-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055470" comment="samba-winbind-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055471" comment="samba-winbind less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055472" comment="samba less than 3.0.26a-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848" source="CVE"/>
	<description>
	The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-&gt;clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2855</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2855" source="CVE"/>
	<description>
	The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function.
	</description>
 </metadata>
<!-- 53d90d0dfc7cde3766b576a0e039dfa4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059036" comment="squid less than 2.5.STABLE5-42.56"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2901</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901" source="CVE"/>
	<description>
	The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
	</description>
 </metadata>
<!-- 4ffe53ac015a623326d3c0421a98e160 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059267" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059268" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059269" comment="jakarta-tomcat-doc less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059270" comment="jakarta-tomcat-examples less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059271" comment="jakarta-tomcat less than 5.0.19-29.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2902</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
	</description>
 </metadata>
<!-- 4ffe53ac015a623326d3c0421a98e160 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059267" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059268" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059269" comment="jakarta-tomcat-doc less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059270" comment="jakarta-tomcat-examples less than 5.0.19-29.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059271" comment="jakarta-tomcat less than 5.0.19-29.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2903</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2903" source="CVE"/>
	<description>
	Memory leak in the appletalk subsystem in the Linux kernel 2.4.x through 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and ipddp modules are loaded but the ipddp"N" device is not found, allows remote attackers to cause a denial of service (memory consumption) via IP-DDP datagrams.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
	<description>
	smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
	</description>
 </metadata>
<!-- ee2dec24f34e3c2a80e8b4b4aee42488 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055501" comment="libsmbclient-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055460" comment="libsmbclient-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055502" comment="libsmbclient-64bit less than 9-200910020935"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055461" comment="libsmbclient-devel less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055462" comment="libsmbclient less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055503" comment="samba-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055463" comment="samba-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055504" comment="samba-client-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055464" comment="samba-client-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055465" comment="samba-client less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055466" comment="samba-doc less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055467" comment="samba-pdb less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055468" comment="samba-python less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055469" comment="samba-vscan less than 0.3.6b-0.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055505" comment="samba-winbind-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055470" comment="samba-winbind-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055471" comment="samba-winbind less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055472" comment="samba less than 3.0.26a-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2909</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2909" source="CVE"/>
	<description>
	Integer signedness error in the ax25_setsockopt function in net/ax25/af_ax25.c in the ax25 subsystem in the Linux kernel before 2.6.31.2 allows local users to cause a denial of service (OOPS) via a crafted optlen value in an SO_BINDTODEVICE operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2910</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910" source="CVE"/>
	<description>
	arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
	<description>
	mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
	</description>
 </metadata>
<!-- ee2dec24f34e3c2a80e8b4b4aee42488 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055501" comment="libsmbclient-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055460" comment="libsmbclient-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055502" comment="libsmbclient-64bit less than 9-200910020935"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055461" comment="libsmbclient-devel less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055462" comment="libsmbclient less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055503" comment="samba-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055463" comment="samba-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055504" comment="samba-client-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055464" comment="samba-client-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055465" comment="samba-client less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055466" comment="samba-doc less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055467" comment="samba-pdb less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055468" comment="samba-python less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055469" comment="samba-vscan less than 0.3.6b-0.39"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055505" comment="samba-winbind-32bit less than 9-200910020932"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055470" comment="samba-winbind-32bit less than 9-200910020934"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055471" comment="samba-winbind less than 3.0.26a-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055472" comment="samba less than 3.0.26a-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3002</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002" source="CVE"/>
	<description>
	The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3080</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3080" source="CVE"/>
	<description>
	Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
	<description>
	The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055712" comment="apache2-devel less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055713" comment="apache2-doc less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055714" comment="apache2-example-pages less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055715" comment="apache2-prefork less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055716" comment="apache2-worker less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055717" comment="apache2 less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
	<description>
	The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
	</description>
 </metadata>
<!-- 2fb3b9eca1524fb5f1da822967ea233e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055712" comment="apache2-devel less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055713" comment="apache2-doc less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055714" comment="apache2-example-pages less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055715" comment="apache2-prefork less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055716" comment="apache2-worker less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055717" comment="apache2 less than 2.0.59-1.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055705" comment="libapr0 less than 2.0.59-1.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3111</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3111" source="CVE"/>
	<description>
	The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11.  NOTE: this is a regression error related to CVE-2003-0967.
	</description>
 </metadata>
<!-- 4a098d8cc41ff1a048a351c0e85d198a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055108" comment="freeradius-devel less than 1.0.5-2.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055109" comment="freeradius less than 1.0.5-2.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3229</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, and 8.2 before 8.2.14 allows remote authenticated users to cause a denial of service (backend shutdown) by "re-LOAD-ing" libraries from a certain plugins directory.
	</description>
 </metadata>
<!-- 723ae3bf7a85462e28a0a9aa02a74216 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055012" comment="postgresql-contrib less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055013" comment="postgresql-devel less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055014" comment="postgresql-docs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055015" comment="postgresql-libs-32bit less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055027" comment="postgresql-libs-32bit less than 9-200909210145"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055028" comment="postgresql-libs-64bit less than 9-200909210409"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055029" comment="postgresql-libs-x86 less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055016" comment="postgresql-libs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055017" comment="postgresql-pl less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055018" comment="postgresql-server less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055019" comment="postgresql less than 7.4.26-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3230</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, 8.2 before 8.2.14, 8.1 before 8.1.18, 8.0 before 8.0.22, and 7.4 before 7.4.26 does not use the appropriate privileges for the (1) RESET ROLE and (2) RESET SESSION AUTHORIZATION operations, which allows remote authenticated users to gain privileges.  NOTE: this is due to an incomplete fix for CVE-2007-6600.
	</description>
 </metadata>
<!-- 723ae3bf7a85462e28a0a9aa02a74216 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055012" comment="postgresql-contrib less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055013" comment="postgresql-devel less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055014" comment="postgresql-docs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055015" comment="postgresql-libs-32bit less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055027" comment="postgresql-libs-32bit less than 9-200909210145"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055028" comment="postgresql-libs-64bit less than 9-200909210409"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055029" comment="postgresql-libs-x86 less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055016" comment="postgresql-libs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055017" comment="postgresql-pl less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055018" comment="postgresql-server less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055019" comment="postgresql less than 7.4.26-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3231</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.3 before 8.3.8 and 8.2 before 8.2.14, when using LDAP authentication with anonymous binds, allows remote attackers to bypass authentication via an empty password.
	</description>
 </metadata>
<!-- 723ae3bf7a85462e28a0a9aa02a74216 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055012" comment="postgresql-contrib less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055013" comment="postgresql-devel less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055014" comment="postgresql-docs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055015" comment="postgresql-libs-32bit less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055027" comment="postgresql-libs-32bit less than 9-200909210145"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055028" comment="postgresql-libs-64bit less than 9-200909210409"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055029" comment="postgresql-libs-x86 less than 9-200909210011"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055016" comment="postgresql-libs less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055017" comment="postgresql-pl less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055018" comment="postgresql-server less than 7.4.26-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055019" comment="postgresql less than 7.4.26-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
	</description>
 </metadata>
<!-- 1046da9c81cb362da527913ebd87f0a3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055779" comment="cyrus-imapd-devel less than 2.2.3-83.42"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055780" comment="cyrus-imapd less than 2.2.3-83.42"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055770" comment="perl-Cyrus-IMAP less than 2.2.3-83.42"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055771" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.3-83.42"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3245</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245" source="CVE"/>
	<description>
	OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
	</description>
 </metadata>
<!-- 72dce8a95f2dec5243d898245bf22114 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059253" comment="openssl-32bit less than 9-201003291534"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059254" comment="openssl-32bit less than 9-201003291538"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059255" comment="openssl-64bit less than 9-201003291547"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059256" comment="openssl-devel-32bit less than 9-201003291534"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059257" comment="openssl-devel-32bit less than 9-201003291538"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059258" comment="openssl-devel-64bit less than 9-201003291547"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059259" comment="openssl-devel less than 0.9.7d-15.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059260" comment="openssl-doc less than 0.9.7d-15.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059261" comment="openssl-x86 less than 9-201003291534"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059262" comment="openssl less than 0.9.7d-15.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3385</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3385" source="CVE"/>
	<description>
	The mail component in Mozilla SeaMonkey before 1.1.19 does not properly restrict execution of scriptable plugin content, which allows user-assisted remote attackers to obtain sensitive information via crafted content in an IFRAME element in an HTML e-mail message, as demonstrated by a Flash object that sends arbitrary local files during a reply or forward operation.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3547</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547" source="CVE"/>
	<description>
	Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3549</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549" source="CVE"/>
	<description>
	packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through 1.2.2, on SPARC and certain other platforms, allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace.
	</description>
 </metadata>
<!-- 8bfa090611f2f19ae85d5e1618353f30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056418" comment="ethereal less than 0.10.13-2.45"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3550</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550" source="CVE"/>
	<description>
	The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a file that records a malformed packet trace.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8bfa090611f2f19ae85d5e1618353f30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056418" comment="ethereal less than 0.10.13-2.45"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3551</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551" source="CVE"/>
	<description>
	Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8bfa090611f2f19ae85d5e1618353f30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056418" comment="ethereal less than 0.10.13-2.45"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
	<description>
	Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 6db1b7a6b1ce521ca8715091dfbc9716 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056987" comment="cups-client less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056988" comment="cups-devel less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056989" comment="cups-libs-32bit less than 9-200912011928"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056996" comment="cups-libs-32bit less than 9-200912020056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056997" comment="cups-libs-64bit less than 9-200912020435"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056998" comment="cups-libs-x86 less than 9-200912011928"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056990" comment="cups-libs less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056991" comment="cups less than 1.1.20-108.63"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
	<description>
	The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 028ac1d630c990e6603a432afaaec22c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067910" comment="gnutls-devel less than 1.0.8-26.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067911" comment="gnutls less than 1.0.8-26.28"/>
		</criteria>
	</criteria>
	<!-- 3d12fd6abfb50f98f6dbe9570a86fcc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060828" comment="IBMJava2-JRE less than 1.4.2_sr13.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060829" comment="IBMJava2-JRE less than 1.4.2_sr13.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060830" comment="IBMJava2-SDK less than 1.4.2_sr13.4-0.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060831" comment="IBMJava2-SDK less than 1.4.2_sr13.4-0.7"/>
		</criteria>
	</criteria>
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- 72dce8a95f2dec5243d898245bf22114 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059253" comment="openssl-32bit less than 9-201003291534"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059254" comment="openssl-32bit less than 9-201003291538"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059255" comment="openssl-64bit less than 9-201003291547"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059256" comment="openssl-devel-32bit less than 9-201003291534"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059257" comment="openssl-devel-32bit less than 9-201003291538"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059258" comment="openssl-devel-64bit less than 9-201003291547"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059259" comment="openssl-devel less than 0.9.7d-15.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059260" comment="openssl-doc less than 0.9.7d-15.43"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059261" comment="openssl-x86 less than 9-201003291534"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059262" comment="openssl less than 0.9.7d-15.43"/>
		</criteria>
	</criteria>
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 966f4c625ed61db11e3e99daf4715b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056281" comment="openssl-32bit less than 9-200911130941"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056276" comment="openssl-32bit less than 9-200911130943"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056282" comment="openssl-64bit less than 9-200911130948"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056283" comment="openssl-devel-32bit less than 9-200911130941"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056277" comment="openssl-devel-32bit less than 9-200911130943"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056284" comment="openssl-devel-64bit less than 9-200911130948"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056278" comment="openssl-devel less than 0.9.7d-15.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056279" comment="openssl-doc less than 0.9.7d-15.41"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056285" comment="openssl-x86 less than 9-200911130943"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056280" comment="openssl less than 0.9.7d-15.41"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
	<description>
	The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2374aacdecd5903ec58f895da571c312 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060340" comment="python-32bit less than 9-201003231321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060341" comment="python-32bit less than 9-201003231557"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060342" comment="python-64bit less than 9-201003232314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060343" comment="python-curses less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060344" comment="python-demo less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060345" comment="python-devel less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060346" comment="python-doc-pdf less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060347" comment="python-doc less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060348" comment="python-gdbm less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060349" comment="python-idle less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060350" comment="python-mpz less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060351" comment="python-tk less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060352" comment="python-x86 less than 9-201003231321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060353" comment="python-xml less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060354" comment="python less than 2.3.3-88.28"/>
		</criteria>
	</criteria>
	<!-- 8e502c324db4da917dfadb04239032d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057198" comment="expat-32bit less than 9-201001081624"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057204" comment="expat-32bit less than 9-201001081626"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057205" comment="expat-64bit less than 9-201001081641"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057206" comment="expat-x86 less than 9-201001081624"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057199" comment="expat less than 1.95.7-37.8"/>
		</criteria>
	</criteria>
	<!-- ad0c25eb89a44da32530ce951773f390 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060885" comment="xmlrpc-c-devel less than 0.9.10-21.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060886" comment="xmlrpc-c less than 0.9.10-21.5"/>
		</criteria>
	</criteria>
	<!-- fba25695a17a176da3149d508dff0ec7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056825" comment="expat-32bit less than 9-200912070059"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056831" comment="expat-32bit less than 9-200912070100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056832" comment="expat-64bit less than 9-200912070059"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056833" comment="expat-x86 less than 9-200912070059"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056826" comment="expat less than 1.95.7-37.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3563</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563" source="CVE"/>
	<description>
	ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
	</description>
 </metadata>
<!-- f69b5cf790bec7136eb63d475e008c89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056878" comment="xntp-doc less than 4.2.0a-23.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056879" comment="xntp less than 4.2.0a-23.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3609</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" source="CVE"/>
	<description>
	Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.
	</description>
 </metadata>
<!-- 6db1b7a6b1ce521ca8715091dfbc9716 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056987" comment="cups-client less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056988" comment="cups-devel less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056989" comment="cups-libs-32bit less than 9-200912011928"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056996" comment="cups-libs-32bit less than 9-200912020056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056997" comment="cups-libs-64bit less than 9-200912020435"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056998" comment="cups-libs-x86 less than 9-200912011928"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056990" comment="cups-libs less than 1.1.20-108.63"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056991" comment="cups less than 1.1.20-108.63"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3620</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3620" source="CVE"/>
	<description>
	The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3621</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3621" source="CVE"/>
	<description>
	net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
	<description>
	The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0989ee5c5681499fbd30756b5f37607b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056331" comment="expat-32bit less than 9-200910300946"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056322" comment="expat-32bit less than 9-200910300949"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056332" comment="expat-64bit less than 9-200910300949"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056333" comment="expat-x86 less than 9-200910300949"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056323" comment="expat less than 1.95.7-37.4"/>
		</criteria>
	</criteria>
	<!-- 2374aacdecd5903ec58f895da571c312 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060340" comment="python-32bit less than 9-201003231321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060341" comment="python-32bit less than 9-201003231557"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060342" comment="python-64bit less than 9-201003232314"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060343" comment="python-curses less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060344" comment="python-demo less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060345" comment="python-devel less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060346" comment="python-doc-pdf less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060347" comment="python-doc less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060348" comment="python-gdbm less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060349" comment="python-idle less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060350" comment="python-mpz less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060351" comment="python-tk less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060352" comment="python-x86 less than 9-201003231321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060353" comment="python-xml less than 2.3.3-88.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060354" comment="python less than 2.3.3-88.28"/>
		</criteria>
	</criteria>
	<!-- ad0c25eb89a44da32530ce951773f390 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060885" comment="xmlrpc-c-devel less than 0.9.10-21.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060886" comment="xmlrpc-c less than 0.9.10-21.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3726</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3726" source="CVE"/>
	<description>
	The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 51eb79501b8e03bf515dafcfc5d912b0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056221" comment="kernel-s390-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056222" comment="kernel-s390 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 66a3e66c695dceba429e6e5538741b7d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056223" comment="kernel-bigsmp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056225" comment="kernel-um less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056227" comment="kernel-xenpae less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056228" comment="um-host-install-initrd less than 1.0-48.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056229" comment="um-host-kernel less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
	<!-- 7647ad06193e496ce89cc593ea9d19da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056231" comment="kernel-64k-pagesize less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056224" comment="kernel-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056232" comment="kernel-sn2 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 77ed33379952aaf1e23ae495aab9c221 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056233" comment="kernel-s390x-debug less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056234" comment="kernel-s390x less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- 8d6ae4279786eaab2134168e22490f95 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056235" comment="kernel-iseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056236" comment="kernel-pmac64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056237" comment="kernel-pseries64 less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
		</criteria>
	</criteria>
	<!-- b26c54164a036ab3b436997e2b5c5874 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056217" comment="kernel-default less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056218" comment="kernel-smp less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056219" comment="kernel-source less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056220" comment="kernel-syms less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056226" comment="kernel-xen less than 2.6.5-7.321"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056230" comment="xen-kmp less than 3.0.4_2.6.5_7.321-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
	<description>
	ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
	</description>
 </metadata>
<!-- 3830dae3e641295cba5e23781e1d720e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058470" comment="libtool-32bit less than 9-200912011710"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058468" comment="libtool-32bit less than 9-200912011711"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058471" comment="libtool-64bit less than 9-200912011715"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058472" comment="libtool-x86 less than 9-200912011711"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058469" comment="libtool less than 1.5.2-56.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3867</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867" source="CVE"/>
	<description>
	Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e39fa7b6677d51e000698bafa946c49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057172" comment="IBMJava2-JRE less than 1.4.2_sr13.3-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057173" comment="IBMJava2-SDK less than 1.4.2_sr13.3-0.7"/>
		</criteria>
	</criteria>
	<!-- bef414c897666b4530c787e16bbc7146 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3868</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868" source="CVE"/>
	<description>
	Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
	</description>
 </metadata>
<!-- bef414c897666b4530c787e16bbc7146 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3869</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869" source="CVE"/>
	<description>
	Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e39fa7b6677d51e000698bafa946c49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057172" comment="IBMJava2-JRE less than 1.4.2_sr13.3-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057173" comment="IBMJava2-SDK less than 1.4.2_sr13.3-0.7"/>
		</criteria>
	</criteria>
	<!-- bef414c897666b4530c787e16bbc7146 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3871</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871" source="CVE"/>
	<description>
	Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e39fa7b6677d51e000698bafa946c49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057172" comment="IBMJava2-JRE less than 1.4.2_sr13.3-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057173" comment="IBMJava2-SDK less than 1.4.2_sr13.3-0.7"/>
		</criteria>
	</criteria>
	<!-- bef414c897666b4530c787e16bbc7146 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3872</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872" source="CVE"/>
	<description>
	Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
	</description>
 </metadata>
<!-- bef414c897666b4530c787e16bbc7146 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3873</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873" source="CVE"/>
	<description>
	The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
	</description>
 </metadata>
<!-- bef414c897666b4530c787e16bbc7146 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3874</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874" source="CVE"/>
	<description>
	Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e39fa7b6677d51e000698bafa946c49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057172" comment="IBMJava2-JRE less than 1.4.2_sr13.3-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057173" comment="IBMJava2-SDK less than 1.4.2_sr13.3-0.7"/>
		</criteria>
	</criteria>
	<!-- bef414c897666b4530c787e16bbc7146 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3875</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875" source="CVE"/>
	<description>
	The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e39fa7b6677d51e000698bafa946c49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057172" comment="IBMJava2-JRE less than 1.4.2_sr13.3-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057173" comment="IBMJava2-SDK less than 1.4.2_sr13.3-0.7"/>
		</criteria>
	</criteria>
	<!-- bef414c897666b4530c787e16bbc7146 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3876</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
<!-- bef414c897666b4530c787e16bbc7146 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3877</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
<!-- bef414c897666b4530c787e16bbc7146 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056992" comment="IBMJava5-JRE less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056993" comment="IBMJava5-JRE less than 1.5.0-0.78"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056994" comment="IBMJava5-SDK less than 1.5.0-0.76"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056995" comment="IBMJava5-SDK less than 1.5.0-0.78"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3889</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3889" source="CVE"/>
	<description>
	The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4005</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4005" source="CVE"/>
	<description>
	The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the Linux kernel before 2.6.32-rc7 allows attackers to have an unspecified impact via a crafted HDLC packet that arrives over ISDN and triggers a buffer under-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4020</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4020" source="CVE"/>
	<description>
	Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
	<description>
	MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
	</description>
 </metadata>
<!-- ed744ae038fa991b8d68cfc1c5b0b76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064246" comment="mysql-Max less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064247" comment="mysql-client less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064248" comment="mysql-devel less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064249" comment="mysql-shared less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064250" comment="mysql less than 4.0.18-32.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 84292b9f8d7063024f7e9beff78f1bc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057268" comment="postgresql-contrib less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057269" comment="postgresql-devel less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057270" comment="postgresql-docs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057271" comment="postgresql-libs-32bit less than 9-201001081716"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057283" comment="postgresql-libs-32bit less than 9-201001081942"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057284" comment="postgresql-libs-64bit less than 9-201001082242"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057285" comment="postgresql-libs-x86 less than 9-201001081716"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057272" comment="postgresql-libs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057273" comment="postgresql-pl less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057274" comment="postgresql-server less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057275" comment="postgresql less than 7.4.27-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
	</description>
 </metadata>
<!-- 84292b9f8d7063024f7e9beff78f1bc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057268" comment="postgresql-contrib less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057269" comment="postgresql-devel less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057270" comment="postgresql-docs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057271" comment="postgresql-libs-32bit less than 9-201001081716"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057283" comment="postgresql-libs-32bit less than 9-201001081942"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057284" comment="postgresql-libs-64bit less than 9-201001082242"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057285" comment="postgresql-libs-x86 less than 9-201001081716"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057272" comment="postgresql-libs less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057273" comment="postgresql-pl less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057274" comment="postgresql-server less than 7.4.27-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057275" comment="postgresql less than 7.4.27-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4274</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" source="CVE"/>
	<description>
	Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
	</description>
 </metadata>
<!-- 3f7af3a871cc6bcd680aaf1d56269216 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058589" comment="libnetpbm less than 1.0.0-618.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058590" comment="netpbm less than 10.11.4-172.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4376</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4376" source="CVE"/>
	<description>
	Buffer overflow in the daintree_sna_read function in the Daintree SNA file parser in Wireshark 1.2.0 through 1.2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
	</description>
 </metadata>
<!-- 4ef381e218bf053815671136afe34cca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058845" comment="ethereal less than 0.10.13-2.47"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4377</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377" source="CVE"/>
	<description>
	The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap.
	</description>
 </metadata>
<!-- 4ef381e218bf053815671136afe34cca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058845" comment="ethereal less than 0.10.13-2.47"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
	<description>
	drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4537</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4537" source="CVE"/>
	<description>
	drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4565</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565" source="CVE"/>
	<description>
	sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- dd489a43d70c932c289d580d903454aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009058488" comment="sendmail-devel less than 8.12.11-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058489" comment="sendmail less than 8.12.11-2.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058490" comment="uucp less than 1.07-225.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5063</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-5063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5063" source="CVE"/>
	<description>
	Memory leak in the embedded_profile_len function in pngwutil.c in libpng before 1.2.39beta5 allows context-dependent attackers to cause a denial of service (memory leak or segmentation fault) via a JPEG image containing an iCCP chunk with a negative embedded profile length.  NOTE: this is due to an incomplete fix for CVE-2006-7244.
	</description>
 </metadata>
<!-- eedf4535799480b79d05b758a184b9ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069808" comment="libpng-32bit less than 9-201108021633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069809" comment="libpng-32bit less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069810" comment="libpng-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069811" comment="libpng-devel-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069812" comment="libpng-devel less than 1.2.5-182.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069813" comment="libpng-x86 less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069814" comment="libpng less than 1.2.5-182.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
	<description>
	Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
	</description>
 </metadata>
<!-- 61555e3bdebb1ff4f9ac9dfdf0b48711 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057425" comment="gzip less than 1.3.5-136.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0007</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007" source="CVE"/>
	<description>
	net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07c0f8cc874baafd99ac348e3dc688c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057998" comment="kernel-iseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057999" comment="kernel-pmac64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058000" comment="kernel-pseries64 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- 115c23c0f70fab25bce4f2dedb036c6c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058004" comment="kernel-bigsmp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058006" comment="kernel-um less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058008" comment="kernel-xenpae less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058009" comment="um-host-install-initrd less than 1.0-48.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058010" comment="um-host-kernel less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 4267d3a69718225e2fb2c25170bc6d94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058001" comment="kernel-smp less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058007" comment="kernel-xen less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058011" comment="xen-kmp less than 3.0.4_2.6.5_7.322-0.2"/>
		</criteria>
	</criteria>
	<!-- 687ae9e3794e96759e414f98fbdce2b2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058012" comment="kernel-s390-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058013" comment="kernel-s390 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- a31f023a60d07c8888e454fa1d125def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058014" comment="kernel-s390x-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058015" comment="kernel-s390x less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
	<!-- f244ff5c3b3396176b5103f1715e6684 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058016" comment="kernel-64k-pagesize less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058005" comment="kernel-debug less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057997" comment="kernel-default less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058017" comment="kernel-sn2 less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058002" comment="kernel-source less than 2.6.5-7.322"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058003" comment="kernel-syms less than 2.6.5-7.322"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0010</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
	</affected>
	<reference ref_id="CVE-2010-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0010" source="CVE"/>
	<description>
	Integer overflow in the ap_proxy_send_fb function in proxy/proxy_util.c in mod_proxy in the Apache HTTP Server before 1.3.42 on 64-bit platforms allows remote origin servers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a large chunk size that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 60d3046e36d94fd5905269dc12f3794e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059964" comment="apache-devel less than 1.3.29-71.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059965" comment="apache-doc less than 1.3.29-71.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059966" comment="apache-example-pages less than 1.3.29-71.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059967" comment="apache less than 1.3.29-71.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059968" comment="mod_ssl less than 2.8.16-71.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0084</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0085</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0087</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0088</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0089</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0091</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0092</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 860976aefb8f9cbced0310de97a9d876 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0094</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.
	</description>
 </metadata>
<!-- 860976aefb8f9cbced0310de97a9d876 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0095</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0098</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0098" source="CVE"/>
	<description>
	ClamAV before 0.96 does not properly handle the (1) CAB and (2) 7z file formats, which allows remote attackers to bypass virus detection via a crafted archive that is compatible with standard archive utilities.
	</description>
 </metadata>
<!-- 7b36491bc9c6a354c5d2cd7f408de4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059969" comment="clamav less than 0.96-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0161</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0161" source="CVE"/>
	<description>
	The nsAuthSSPI::Unwrap function in extensions/auth/nsAuthSSPI.cpp in Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 on Windows Vista, Windows Server 2008 R2, and Windows 7 allows remote SMTP, IMAP, and POP servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via crafted data in a session that uses SSPI.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0163</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0163" source="CVE"/>
	<description>
	Mozilla Thunderbird before 2.0.0.24 and SeaMonkey before 1.1.19 process e-mail attachments with a parser that performs casts and line termination incorrectly, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted message, related to message indexing.
	</description>
 </metadata>
<!-- acaf6c9c6b25a182bcd2944dfc0bc0ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060689" comment="mozilla-devel less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060690" comment="mozilla-dom-inspector less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060691" comment="mozilla-irc less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060692" comment="mozilla-mail less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060693" comment="mozilla-venkman less than 1.8_seamonkey_1.1.19-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060694" comment="mozilla less than 1.8_seamonkey_1.1.19-0.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0205</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205" source="CVE"/>
	<description>
	The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
	</description>
 </metadata>
<!-- 41972736cb93dd48fcc81667c985e268 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060266" comment="libpng-32bit less than 9-201003180213"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060267" comment="libpng-32bit less than 9-201003180217"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060268" comment="libpng-64bit less than 9-201003180220"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060269" comment="libpng-devel-64bit less than 9-201003180220"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060270" comment="libpng-devel less than 1.2.5-182.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060271" comment="libpng-x86 less than 9-201003180213"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060272" comment="libpng less than 1.2.5-182.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0211</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211" source="CVE"/>
	<description>
	The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
	</description>
 </metadata>
<!-- 60b58574d42dc778b92a109ac5055057 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062066" comment="openldap2-back-ldap less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062067" comment="openldap2-back-meta less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062068" comment="openldap2-back-monitor less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062069" comment="openldap2-back-perl less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062070" comment="openldap2-client-32bit less than 9-201006301103"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062071" comment="openldap2-client-32bit less than 9-201006301111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062072" comment="openldap2-client-64bit less than 9-201006301115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062073" comment="openldap2-client-x86 less than 9-201006301103"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062074" comment="openldap2-client less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062075" comment="openldap2-devel-32bit less than 9-201006301103"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062076" comment="openldap2-devel-32bit less than 9-201006301111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062077" comment="openldap2-devel-64bit less than 9-201006301115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062078" comment="openldap2-devel less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062079" comment="openldap2 less than 2.2.24-4.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0212</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212" source="CVE"/>
	<description>
	OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
	</description>
 </metadata>
<!-- 60b58574d42dc778b92a109ac5055057 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062066" comment="openldap2-back-ldap less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062067" comment="openldap2-back-meta less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062068" comment="openldap2-back-monitor less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062069" comment="openldap2-back-perl less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062070" comment="openldap2-client-32bit less than 9-201006301103"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062071" comment="openldap2-client-32bit less than 9-201006301111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062072" comment="openldap2-client-64bit less than 9-201006301115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062073" comment="openldap2-client-x86 less than 9-201006301103"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062074" comment="openldap2-client less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062075" comment="openldap2-devel-32bit less than 9-201006301103"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062076" comment="openldap2-devel-32bit less than 9-201006301111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062077" comment="openldap2-devel-64bit less than 9-201006301115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062078" comment="openldap2-devel less than 2.2.24-4.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062079" comment="openldap2 less than 2.2.24-4.33"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0296</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296" source="CVE"/>
	<description>
	The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
	</description>
 </metadata>
<!-- 6c6c779a7e1b77757f542bf1cb6b5802 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063329" comment="glibc-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063330" comment="glibc-32bit less than 9-201008251911"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063331" comment="glibc-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063332" comment="glibc-devel-32bit less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063333" comment="glibc-devel-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063334" comment="glibc-devel-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063335" comment="glibc-devel less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063336" comment="glibc-html less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063337" comment="glibc-i18ndata less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063338" comment="glibc-info less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063339" comment="glibc-locale-32bit less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063340" comment="glibc-locale-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063341" comment="glibc-locale-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063342" comment="glibc-locale-x86 less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063343" comment="glibc-locale less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063344" comment="glibc-profile-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063345" comment="glibc-profile less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063346" comment="glibc-x86 less than 9-201008251911"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063347" comment="glibc less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063348" comment="nscd less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063349" comment="timezone less than 2.3.3-98.114"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0304</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304" source="CVE"/>
	<description>
	Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
	</description>
 </metadata>
<!-- 4ef381e218bf053815671136afe34cca -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009058845" comment="ethereal less than 0.10.13-2.47"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0308</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0308" source="CVE"/>
	<description>
	lib/rfc1035.c in Squid 2.x, 3.0 through 3.0.STABLE22, and 3.1 through 3.1.0.15 allows remote attackers to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header.
	</description>
 </metadata>
<!-- 53d90d0dfc7cde3766b576a0e039dfa4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059036" comment="squid less than 2.5.STABLE5-42.56"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
	<description>
	Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
	</description>
 </metadata>
<!-- f4dc34aa42ed3958a7ed4dc0686bf4ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063189" comment="bzip2-32bit less than 9-201009152108"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063190" comment="bzip2-32bit less than 9-201009152109"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063191" comment="bzip2-64bit less than 9-201009152111"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063192" comment="bzip2-x86 less than 9-201009152108"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063193" comment="bzip2 less than 1.0.2-346.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0421</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0421" source="CVE"/>
	<description>
	Array index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/hb-ot-layout.cc in Pango before 1.27.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted font file, related to building a synthetic Glyph Definition (aka GDEF) table by using this font's charmap and the Unicode property database.
	</description>
 </metadata>
<!-- 9bfad28030502926afa99164ca69c9bb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060646" comment="pango-32bit less than 9-201004301253"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060647" comment="pango-32bit less than 9-201004301254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060648" comment="pango-64bit less than 9-201004301300"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060649" comment="pango-devel-64bit less than 9-201004301300"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060650" comment="pango-devel less than 1.2.5-174.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060651" comment="pango-doc less than 1.2.5-174.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060652" comment="pango-x86 less than 9-201004301254"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060653" comment="pango less than 1.2.5-174.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
	<description>
	The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
	</description>
 </metadata>
<!-- 9f4e1141cc45321d6bd8440284309eae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064781" comment="cups-client less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064782" comment="cups-devel less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064783" comment="cups-libs-32bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064784" comment="cups-libs-64bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064785" comment="cups-libs-x86 less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064786" comment="cups-libs less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064787" comment="cups less than 1.1.20-108.65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
	</description>
 </metadata>
<!-- d1d961ba29e086fb44a36051ddc16fd9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059272" comment="libsmbclient-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059273" comment="libsmbclient-64bit less than 9-201003120132"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059274" comment="libsmbclient-devel less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059275" comment="libsmbclient less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059276" comment="samba-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059277" comment="samba-client-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059278" comment="samba-client less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059279" comment="samba-doc less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059280" comment="samba-pdb less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059281" comment="samba-python less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059282" comment="samba-vscan less than 0.3.6b-0.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059283" comment="samba-winbind-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059284" comment="samba-winbind less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059285" comment="samba less than 3.0.26a-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
	<description>
	Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94974a5e4ca9cc993772060fd2adbe66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060059" comment="cpio less than 2.6-70.5"/>
	</criteria>
	<!-- c8fedf2dbf993f81c3308b81912e0cb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060022" comment="tar less than 1.13.25-325.12"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0727</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0727" source="CVE"/>
	<description>
	The gfs2_lock function in the Linux kernel before 2.6.34-rc1-next-20100312, and the gfs_lock function in the Linux kernel on Red Hat Enterprise Linux (RHEL) 5 and 6, does not properly remove POSIX locks on files that are setgid without group-execute permission, which allows local users to cause a denial of service (BUG and system crash) by locking a file on a (1) GFS or (2) GFS2 filesystem, and then changing this file's permissions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0731</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
	</affected>
	<reference ref_id="CVE-2010-0731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0731" source="CVE"/>
	<description>
	The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote attackers to bypass the certificate revocation list (CRL) check and cause a stack-based buffer overflow via a crafted X.509 certificate, related to extraction of a serial number.
	</description>
 </metadata>
<!-- 305a698f51e65c15880eb85e4f91ec7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060899" comment="gnutls-devel less than 1.0.8-26.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060900" comment="gnutls less than 1.0.8-26.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0830</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830" source="CVE"/>
	<description>
	Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
	</description>
 </metadata>
<!-- 6c6c779a7e1b77757f542bf1cb6b5802 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063329" comment="glibc-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063330" comment="glibc-32bit less than 9-201008251911"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063331" comment="glibc-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063332" comment="glibc-devel-32bit less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063333" comment="glibc-devel-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063334" comment="glibc-devel-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063335" comment="glibc-devel less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063336" comment="glibc-html less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063337" comment="glibc-i18ndata less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063338" comment="glibc-info less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063339" comment="glibc-locale-32bit less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063340" comment="glibc-locale-32bit less than 9-201008251343"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063341" comment="glibc-locale-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063342" comment="glibc-locale-x86 less than 9-201008251304"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063343" comment="glibc-locale less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063344" comment="glibc-profile-64bit less than 9-201008251703"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063345" comment="glibc-profile less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063346" comment="glibc-x86 less than 9-201008251911"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063347" comment="glibc less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063348" comment="nscd less than 2.3.3-98.114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063349" comment="timezone less than 2.3.3-98.114"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0837</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837" source="CVE"/>
	<description>
	Unspecified vulnerability in the Pack200 component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 860976aefb8f9cbced0310de97a9d876 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0838</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow using an untrusted size value in the readMabCurveData function in the CMM module in the JVM.
	</description>
 </metadata>
<!-- 860976aefb8f9cbced0310de97a9d876 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0839</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0840</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0841</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841" source="CVE"/>
	<description>
	Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote attackers to execute arbitrary code via a JPEG image that contains subsample dimensions with large values, related to JPEGImageReader and "stepX".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0842</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an uncontrolled array index that allows remote attackers to execute arbitrary code via a MIDI file with a crafted MixerSequencer object, related to the GM_Song structure.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0843</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is related to XNewPtr and improper handling of an integer parameter when allocating heap memory in the com.sun.media.sound libraries, which allows remote attackers to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0844</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is for improper parsing of a crafted MIDI stream when creating a MixerSequencer object, which causes a pointer to be corrupted and allows a NULL byte to be written to arbitrary memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0846</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846" source="CVE"/>
	<description>
	Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows remote attackers to execute arbitrary code, related to an "invalid assignment" and inconsistent length values in a JPEG image encoder (JPEGImageEncoderImpl).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0847</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0849</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow in a decoding routine used by the JPEGImageDecoderImpl interface, which allows code execution via a crafted JPEG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 860976aefb8f9cbced0310de97a9d876 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061139" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061140" comment="IBMJava5-JRE less than 1.5.0_sr11.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061141" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061142" comment="IBMJava5-SDK less than 1.5.0_sr11.2-0.6"/>
		</criteria>
	</criteria>
	<!-- 8a085a3fd07eed2b675fc823cf1477e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062170" comment="IBMJava2-JRE less than 1.4.2_sr13.5-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062171" comment="IBMJava2-SDK less than 1.4.2_sr13.5-0.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
	<description>
	The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
	</description>
 </metadata>
<!-- d1d961ba29e086fb44a36051ddc16fd9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009059272" comment="libsmbclient-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059273" comment="libsmbclient-64bit less than 9-201003120132"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059274" comment="libsmbclient-devel less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059275" comment="libsmbclient less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059276" comment="samba-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059277" comment="samba-client-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059278" comment="samba-client less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059279" comment="samba-doc less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059280" comment="samba-pdb less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059281" comment="samba-python less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059282" comment="samba-vscan less than 0.3.6b-0.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059283" comment="samba-winbind-32bit less than 9-201003120118"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059284" comment="samba-winbind less than 3.0.26a-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059285" comment="samba less than 3.0.26a-0.13"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1083</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1083" source="CVE"/>
	<description>
	The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel 2.6.x through 2.6.32, and possibly other versions, does not clear the transfer buffer before returning to userspace when a USB command fails, which might make it easier for physically proximate attackers to obtain sensitive information (kernel memory).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1088</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1088" source="CVE"/>
	<description>
	fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1157</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
	</description>
 </metadata>
<!-- ee1d244469e2d04ec73f97ff4eaf890f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062644" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062645" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062646" comment="jakarta-tomcat-doc less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062647" comment="jakarta-tomcat-examples less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062648" comment="jakarta-tomcat less than 5.0.19-29.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1166</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1166" source="CVE"/>
	<description>
	The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b01564d1213e89d8d6c0455b9a60bf2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061155" comment="XFree86-Mesa-32bit less than 9-201004201452"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061156" comment="XFree86-Mesa-32bit less than 9-201004201540"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061157" comment="XFree86-Mesa-64bit less than 9-201004201543"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061158" comment="XFree86-Mesa-devel-32bit less than 9-201004201452"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061159" comment="XFree86-Mesa-devel-32bit less than 9-201004201540"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061160" comment="XFree86-Mesa-devel-64bit less than 9-201004201543"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061161" comment="XFree86-Mesa-devel less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061162" comment="XFree86-Mesa-x86 less than 9-201004201452"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061163" comment="XFree86-Mesa less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061164" comment="XFree86-Xnest less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061165" comment="XFree86-Xprt less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061166" comment="XFree86-Xvfb less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061167" comment="XFree86-Xvnc less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061168" comment="XFree86-devel-32bit less than 9-201004201452"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061169" comment="XFree86-devel-32bit less than 9-201004201540"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061170" comment="XFree86-devel-64bit less than 9-201004201543"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061171" comment="XFree86-devel less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061172" comment="XFree86-doc less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061173" comment="XFree86-driver-options less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061174" comment="XFree86-fonts-100dpi less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061175" comment="XFree86-fonts-75dpi less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061176" comment="XFree86-fonts-cyrillic less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061177" comment="XFree86-fonts-scalable less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061178" comment="XFree86-fonts-syriac less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061179" comment="XFree86-libs-32bit less than 9-201004201452"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061180" comment="XFree86-libs-32bit less than 9-201004201540"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061181" comment="XFree86-libs-64bit less than 9-201004201543"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061182" comment="XFree86-libs-x86 less than 9-201004201452"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061183" comment="XFree86-libs less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061184" comment="XFree86-man less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061185" comment="XFree86-server-glx less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061186" comment="XFree86-server less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061187" comment="XFree86 less than 4.3.99.902-43.100"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061188" comment="km_drm less than 4.3.99.902-43.100"/>
		</criteria>
	</criteria>
	<!-- 931fdfdcf903e6f07feda411999fe2d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063327" comment="XFree86-server-glx less than 4.3.99.902-43.104"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063328" comment="XFree86-server less than 4.3.99.902-43.104"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1168</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1168" source="CVE"/>
	<description>
	The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
	</description>
 </metadata>
<!-- 490d300cac4af94be4f7b78dab0a3d7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062043" comment="perl-32bit less than 9-201007292356"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062044" comment="perl-32bit less than 9-201007300002"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062045" comment="perl-64bit less than 9-201007300007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062046" comment="perl-x86 less than 9-201007292356"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062047" comment="perl less than 5.8.3-32.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1188</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1188" source="CVE"/>
	<description>
	Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
	<description>
	Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
	</description>
 </metadata>
<!-- e11599e14f43997b33d1c7f7177d13ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062286" comment="libpng-32bit less than 9-201009011027"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062287" comment="libpng-32bit less than 9-201009011028"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062288" comment="libpng-64bit less than 9-201009011033"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062289" comment="libpng-devel-64bit less than 9-201009011033"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062290" comment="libpng-devel less than 1.2.5-182.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062291" comment="libpng-x86 less than 9-201009011027"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062292" comment="libpng less than 1.2.5-182.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1311</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1311" source="CVE"/>
	<description>
	The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka .Q) compression format.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 7b36491bc9c6a354c5d2cd7f408de4a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009059969" comment="clamav less than 0.96-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
	<description>
	The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 590230b30e60bc28e0cacab0ea3befd2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065614" comment="IBMJava2-JRE less than 1.4.2_sr13.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065615" comment="IBMJava2-JRE less than 1.4.2_sr13.8-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065616" comment="IBMJava2-SDK less than 1.4.2_sr13.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065617" comment="IBMJava2-SDK less than 1.4.2_sr13.8-0.7"/>
		</criteria>
	</criteria>
	<!-- 8ced63d62f393423811b2263af4bc085 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066022" comment="IBMJava2-JRE less than 1.4.2_sr13.8-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066023" comment="IBMJava2-SDK less than 1.4.2_sr13.8-0.15"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1411</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411" source="CVE"/>
	<description>
	Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the FAX3 decoder in LibTIFF before 3.9.3, as used in ImageIO in Apple Mac OS X 10.5.8 and Mac OS X 10.6 before 10.6.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- c78b33c44c46fd4f6e57e5e38b5fb014 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060850" comment="libtiff-32bit less than 9-201005251428"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060851" comment="libtiff-32bit less than 9-201005251430"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060852" comment="libtiff-64bit less than 9-201005251431"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060853" comment="libtiff-x86 less than 9-201005251428"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060854" comment="libtiff less than 3.6.1-38.43"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1447</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1447" source="CVE"/>
	<description>
	The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
	</description>
 </metadata>
<!-- 490d300cac4af94be4f7b78dab0a3d7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062043" comment="perl-32bit less than 9-201007292356"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062044" comment="perl-32bit less than 9-201007300002"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062045" comment="perl-64bit less than 9-201007300007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062046" comment="perl-x86 less than 9-201007292356"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062047" comment="perl less than 5.8.3-32.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1626</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1626" source="CVE"/>
	<description>
	MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
	</description>
 </metadata>
<!-- ed744ae038fa991b8d68cfc1c5b0b76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064246" comment="mysql-Max less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064247" comment="mysql-client less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064248" comment="mysql-devel less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064249" comment="mysql-shared less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064250" comment="mysql less than 4.0.18-32.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1639</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639" source="CVE"/>
	<description>
	The cli_pdf function in libclamav/pdf.c in ClamAV before 0.96.1 allows remote attackers to cause a denial of service (crash) via a malformed PDF file, related to an inconsistency in the calculated stream length and the real stream length.
	</description>
 </metadata>
<!-- e266d6f2e3c599114a2352122192ac36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061755" comment="clamav less than 0.96.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1640</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640" source="CVE"/>
	<description>
	Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling.
	</description>
 </metadata>
<!-- e266d6f2e3c599114a2352122192ac36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061755" comment="clamav less than 0.96.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1674</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674" source="CVE"/>
	<description>
	The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
	</description>
 </metadata>
<!-- 75529439da717e47cde973b05cbe940b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066673" comment="quagga less than 0.99.7-11.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1675</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675" source="CVE"/>
	<description>
	bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
	</description>
 </metadata>
<!-- 75529439da717e47cde973b05cbe940b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066673" comment="quagga less than 0.99.7-11.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
	<description>
	The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
	</description>
 </metadata>
<!-- 9f4e1141cc45321d6bd8440284309eae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064781" comment="cups-client less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064782" comment="cups-devel less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064783" comment="cups-libs-32bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064784" comment="cups-libs-64bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064785" comment="cups-libs-x86 less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064786" comment="cups-libs less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064787" comment="cups less than 1.1.20-108.65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1797</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1848" source="CVE"/>
	<description>
	Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
	</description>
 </metadata>
<!-- ed744ae038fa991b8d68cfc1c5b0b76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064246" comment="mysql-Max less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064247" comment="mysql-client less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064248" comment="mysql-devel less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064249" comment="mysql-shared less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064250" comment="mysql less than 4.0.18-32.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1849</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1849" source="CVE"/>
	<description>
	The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
	</description>
 </metadata>
<!-- ed744ae038fa991b8d68cfc1c5b0b76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064246" comment="mysql-Max less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064247" comment="mysql-client less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064248" comment="mysql-devel less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064249" comment="mysql-shared less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064250" comment="mysql less than 4.0.18-32.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
	<description>
	Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
	</description>
 </metadata>
<!-- a76292ab5672d19b4fc87e9ab3b82cb5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060925" comment="libsmbclient-32bit less than 9-201006132231"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060926" comment="libsmbclient-32bit less than 9-201006132232"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060927" comment="libsmbclient-64bit less than 9-201006132237"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060928" comment="libsmbclient-devel less than 3.0.26a-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060929" comment="libsmbclient less than 3.0.26a-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060930" comment="samba-32bit less than 9-201006132231"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060931" comment="samba-32bit less than 9-201006132232"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060932" comment="samba-client-32bit less than 9-201006132231"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060933" comment="samba-client-32bit less than 9-201006132232"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060934" comment="samba-client less than 3.0.26a-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060935" comment="samba-doc less than 3.0.26a-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060936" comment="samba-pdb less than 3.0.26a-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060937" comment="samba-python less than 3.0.26a-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060938" comment="samba-vscan less than 0.3.6b-0.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060939" comment="samba-winbind-32bit less than 9-201006132231"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060940" comment="samba-winbind-32bit less than 9-201006132232"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060941" comment="samba-winbind less than 3.0.26a-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060942" comment="samba less than 3.0.26a-0.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2077</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2077" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-1640.  Reason: This candidate is a duplicate of CVE-2010-1640.  Notes: All CVE users should reference CVE-2010-1640 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- e266d6f2e3c599114a2352122192ac36 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061755" comment="clamav less than 0.96.1-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2226</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2226" source="CVE"/>
	<description>
	The xfs_swapext function in fs/xfs/xfs_dfrag.c in the Linux kernel before 2.6.35 does not properly check the file descriptors passed to the SWAPEXT ioctl, which allows local users to leverage write access and obtain read access by swapping one file into another file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bd8accd878f6b5293b9e691425505b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070707" comment="kernel-iseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070708" comment="kernel-pmac64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070709" comment="kernel-pseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- 7d1fdc4c5ea34f4b010c09e5e802ea33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062914" comment="kernel-64k-pagesize less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062917" comment="kernel-sn2 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- df0b3a22aea6712d710966ee1ce66df8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
	<!-- fa05a89be656a90eb2c8b19eeff0dd16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062923" comment="kernel-bigsmp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062924" comment="kernel-um less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062925" comment="kernel-xenpae less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062926" comment="um-host-install-initrd less than 1.0-48.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062927" comment="um-host-kernel less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2227</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
	</description>
 </metadata>
<!-- ee1d244469e2d04ec73f97ff4eaf890f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062644" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062645" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062646" comment="jakarta-tomcat-doc less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062647" comment="jakarta-tomcat-examples less than 5.0.19-29.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062648" comment="jakarta-tomcat less than 5.0.19-29.27"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
	<description>
	The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
	</description>
 </metadata>
<!-- 931fdfdcf903e6f07feda411999fe2d7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063327" comment="XFree86-server-glx less than 4.3.99.902-43.104"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063328" comment="XFree86-server less than 4.3.99.902-43.104"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2248</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2248" source="CVE"/>
	<description>
	fs/cifs/cifssmb.c in the CIFS implementation in the Linux kernel before 2.6.34-rc4 allows remote attackers to cause a denial of service (panic) via an SMB response packet with an invalid CountHigh value, as demonstrated by a response from an OS/2 server, related to the CIFSSMBWrite and CIFSSMBWrite2 functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bd8accd878f6b5293b9e691425505b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070707" comment="kernel-iseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070708" comment="kernel-pmac64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070709" comment="kernel-pseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- 7d1fdc4c5ea34f4b010c09e5e802ea33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062914" comment="kernel-64k-pagesize less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062917" comment="kernel-sn2 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- df0b3a22aea6712d710966ee1ce66df8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
	<!-- fa05a89be656a90eb2c8b19eeff0dd16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062923" comment="kernel-bigsmp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062924" comment="kernel-um less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062925" comment="kernel-xenpae less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062926" comment="um-host-install-initrd less than 1.0-48.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062927" comment="um-host-kernel less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2249</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249" source="CVE"/>
	<description>
	Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.
	</description>
 </metadata>
<!-- e11599e14f43997b33d1c7f7177d13ed -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062286" comment="libpng-32bit less than 9-201009011027"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062287" comment="libpng-32bit less than 9-201009011028"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062288" comment="libpng-64bit less than 9-201009011033"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062289" comment="libpng-devel-64bit less than 9-201009011033"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062290" comment="libpng-devel less than 1.2.5-182.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062291" comment="libpng-x86 less than 9-201009011027"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062292" comment="libpng less than 1.2.5-182.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
	<description>
	Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2498</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" source="CVE"/>
	<description>
	The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2499</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LaserWriter PS font file with an embedded PFB fragment.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2500</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" source="CVE"/>
	<description>
	Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2519</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2520</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2521</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521" source="CVE"/>
	<description>
	Multiple buffer overflows in fs/nfsd/nfs4xdr.c in the XDR implementation in the NFS server in the Linux kernel before 2.6.34-rc6 allow remote attackers to cause a denial of service (panic) or possibly execute arbitrary code via a crafted NFSv4 compound WRITE request, related to the read_buf and nfsd4_decode_compound functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 46a94f2d03cb2089d641b6390867fd8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062112" comment="kernel-bigsmp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062118" comment="kernel-um less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062120" comment="kernel-xenpae less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062121" comment="um-host-install-initrd less than 1.0-48.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062122" comment="um-host-kernel less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- 5d5bd50baa9a4fcb6b4fda8d7a3a79f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062124" comment="kernel-s390x-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062125" comment="kernel-s390x less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- a3f3f41a042648ecf313d65b8ff974ac -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062126" comment="kernel-64k-pagesize less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062113" comment="kernel-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062127" comment="kernel-sn2 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- b13b7c37b794913aaef1d239c08b31ab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062119" comment="kernel-xen less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062123" comment="xen-kmp less than 3.0.4_2.6.5_7.323-0.2"/>
		</criteria>
	</criteria>
	<!-- dd0f13d71502c69174ee0008c6ae7a63 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062114" comment="kernel-default less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062128" comment="kernel-iseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062129" comment="kernel-pmac64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062130" comment="kernel-pseries64 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062115" comment="kernel-smp less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
	<!-- ec0907a749db912429f923a2bbfdcfff -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062131" comment="kernel-s390-debug less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062132" comment="kernel-s390 less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062116" comment="kernel-source less than 2.6.5-7.323"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062117" comment="kernel-syms less than 2.6.5-7.323"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2527</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" source="CVE"/>
	<description>
	Multiple buffer overflows in demo programs in FreeType before 2.4.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2541</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" source="CVE"/>
	<description>
	Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
	<description>
	The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2806</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" source="CVE"/>
	<description>
	Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2807</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" source="CVE"/>
	<description>
	FreeType before 2.4.2 uses incorrect integer data types during bounds checking, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2808</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
	</description>
 </metadata>
<!-- 8912230a7292ff76cec291aa2de5ea96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062133" comment="freetype2-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062134" comment="freetype2-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062135" comment="freetype2-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062136" comment="freetype2-devel-32bit less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062137" comment="freetype2-devel-32bit less than 9-201008121259"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062138" comment="freetype2-devel-64bit less than 9-201008121302"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062139" comment="freetype2-devel less than 2.1.7-53.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062140" comment="freetype2-x86 less than 9-201008121257"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062141" comment="freetype2 less than 2.1.7-53.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
	<description>
	The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bd8accd878f6b5293b9e691425505b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070707" comment="kernel-iseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070708" comment="kernel-pmac64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070709" comment="kernel-pseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- 7d1fdc4c5ea34f4b010c09e5e802ea33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062914" comment="kernel-64k-pagesize less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062917" comment="kernel-sn2 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- df0b3a22aea6712d710966ee1ce66df8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
	<!-- fa05a89be656a90eb2c8b19eeff0dd16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062923" comment="kernel-bigsmp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062924" comment="kernel-um less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062925" comment="kernel-xenpae less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062926" comment="um-host-install-initrd less than 1.0-48.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062927" comment="um-host-kernel less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2946</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2946" source="CVE"/>
	<description>
	fs/jfs/xattr.c in the Linux kernel before 2.6.35.2 does not properly handle a certain legacy format for storage of extended attributes, which might allow local users by bypass intended xattr namespace restrictions via an "os2." substring at the beginning of a name.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2948</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2948" source="CVE"/>
	<description>
	Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.
	</description>
 </metadata>
<!-- 75529439da717e47cde973b05cbe940b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066673" comment="quagga less than 0.99.7-11.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2949</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2949" source="CVE"/>
	<description>
	bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message.
	</description>
 </metadata>
<!-- 75529439da717e47cde973b05cbe940b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066673" comment="quagga less than 0.99.7-11.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
	<description>
	The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bd8accd878f6b5293b9e691425505b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070707" comment="kernel-iseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070708" comment="kernel-pmac64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070709" comment="kernel-pseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- 7d1fdc4c5ea34f4b010c09e5e802ea33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062914" comment="kernel-64k-pagesize less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062917" comment="kernel-sn2 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- df0b3a22aea6712d710966ee1ce66df8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
	<!-- fa05a89be656a90eb2c8b19eeff0dd16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062923" comment="kernel-bigsmp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062924" comment="kernel-um less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062925" comment="kernel-xenpae less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062926" comment="um-host-install-initrd less than 1.0-48.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062927" comment="um-host-kernel less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
	<description>
	bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
	</description>
 </metadata>
<!-- 23aa353e48c7373ae76180f37c4ae4e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063354" comment="freetype2-32bit less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063355" comment="freetype2-32bit less than 9-201010062116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063356" comment="freetype2-64bit less than 9-201010062115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063357" comment="freetype2-devel-32bit less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063358" comment="freetype2-devel-32bit less than 9-201010062116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063359" comment="freetype2-devel-64bit less than 9-201010062115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063360" comment="freetype2-devel less than 2.1.7-53.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063361" comment="freetype2-x86 less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063362" comment="freetype2 less than 2.1.7-53.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
	<description>
	Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
	</description>
 </metadata>
<!-- 23aa353e48c7373ae76180f37c4ae4e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063354" comment="freetype2-32bit less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063355" comment="freetype2-32bit less than 9-201010062116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063356" comment="freetype2-64bit less than 9-201010062115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063357" comment="freetype2-devel-32bit less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063358" comment="freetype2-devel-32bit less than 9-201010062116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063359" comment="freetype2-devel-64bit less than 9-201010062115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063360" comment="freetype2-devel less than 2.1.7-53.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063361" comment="freetype2-x86 less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063362" comment="freetype2 less than 2.1.7-53.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3067</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067" source="CVE"/>
	<description>
	Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
	</description>
 </metadata>
<!-- 4ed54824715a946d3dd603a52083587b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063194" comment="libsmbclient-32bit less than 9-201009141040"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063195" comment="libsmbclient-32bit less than 9-201009141043"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063196" comment="libsmbclient-64bit less than 9-201009141106"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063197" comment="libsmbclient-devel less than 3.0.26a-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063198" comment="libsmbclient less than 3.0.26a-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063199" comment="samba-32bit less than 9-201009141040"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063200" comment="samba-32bit less than 9-201009141043"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063201" comment="samba-client-32bit less than 9-201009141040"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063202" comment="samba-client-32bit less than 9-201009141043"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063203" comment="samba-client less than 3.0.26a-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063204" comment="samba-doc less than 3.0.26a-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063205" comment="samba-pdb less than 3.0.26a-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063206" comment="samba-python less than 3.0.26a-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063207" comment="samba-vscan less than 0.3.6b-0.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063208" comment="samba-winbind-32bit less than 9-201009141040"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063209" comment="samba-winbind-32bit less than 9-201009141043"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063210" comment="samba-winbind less than 3.0.26a-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063211" comment="samba less than 3.0.26a-0.17"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3078</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078" source="CVE"/>
	<description>
	The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bd8accd878f6b5293b9e691425505b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070707" comment="kernel-iseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070708" comment="kernel-pmac64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070709" comment="kernel-pseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- 7d1fdc4c5ea34f4b010c09e5e802ea33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062914" comment="kernel-64k-pagesize less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062917" comment="kernel-sn2 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- df0b3a22aea6712d710966ee1ce66df8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
	<!-- fa05a89be656a90eb2c8b19eeff0dd16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062923" comment="kernel-bigsmp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062924" comment="kernel-um less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062925" comment="kernel-xenpae less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062926" comment="um-host-install-initrd less than 1.0-48.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062927" comment="um-host-kernel less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
	<description>
	The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bd8accd878f6b5293b9e691425505b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070707" comment="kernel-iseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070708" comment="kernel-pmac64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070709" comment="kernel-pseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- 7d1fdc4c5ea34f4b010c09e5e802ea33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062914" comment="kernel-64k-pagesize less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062917" comment="kernel-sn2 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- df0b3a22aea6712d710966ee1ce66df8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
	<!-- fa05a89be656a90eb2c8b19eeff0dd16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062923" comment="kernel-bigsmp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062924" comment="kernel-um less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062925" comment="kernel-xenpae less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062926" comment="um-host-install-initrd less than 1.0-48.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062927" comment="um-host-kernel less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
	<description>
	The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5bd8accd878f6b5293b9e691425505b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070707" comment="kernel-iseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070708" comment="kernel-pmac64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070709" comment="kernel-pseries64 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- 7d1fdc4c5ea34f4b010c09e5e802ea33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062914" comment="kernel-64k-pagesize less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062917" comment="kernel-sn2 less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
		</criteria>
	</criteria>
	<!-- df0b3a22aea6712d710966ee1ce66df8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
	<!-- fa05a89be656a90eb2c8b19eeff0dd16 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062923" comment="kernel-bigsmp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062915" comment="kernel-debug less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062916" comment="kernel-default less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062920" comment="kernel-smp less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062918" comment="kernel-source less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062919" comment="kernel-syms less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062924" comment="kernel-um less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062921" comment="kernel-xen less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062925" comment="kernel-xenpae less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062926" comment="um-host-install-initrd less than 1.0-48.37"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062927" comment="um-host-kernel less than 2.6.5-7.324"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062922" comment="xen-kmp less than 3.0.4_2.6.5_7.324-0.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
	<description>
	Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
	<description>
	Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
	</description>
 </metadata>
<!-- 23aa353e48c7373ae76180f37c4ae4e2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063354" comment="freetype2-32bit less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063355" comment="freetype2-32bit less than 9-201010062116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063356" comment="freetype2-64bit less than 9-201010062115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063357" comment="freetype2-devel-32bit less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063358" comment="freetype2-devel-32bit less than 9-201010062116"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063359" comment="freetype2-devel-64bit less than 9-201010062115"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063360" comment="freetype2-devel less than 2.1.7-53.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063361" comment="freetype2-x86 less than 9-201010062114"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063362" comment="freetype2 less than 2.1.7-53.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3434</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3434" source="CVE"/>
	<description>
	Buffer overflow in the find_stream_bounds function in pdf.c in libclamav in ClamAV before 0.96.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- c2e635d36cda7ebfe3321d2d3661fa6b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064560" comment="clamav less than 0.96.4-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3442</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3442" source="CVE"/>
	<description>
	Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3541</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3548</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or "otherwise-protected internal network names."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3549</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3550</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- cd828eb9d951041e00c2311802ef70a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3551</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3553</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- 95815b521b62658697365ff982d3f827 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066162" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066163" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066164" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066165" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3556</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3557</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- 95815b521b62658697365ff982d3f827 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066162" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066163" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066164" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066165" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3559</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this involves an incorrect sign extension in the HeadspaceSoundbank.nGetName function, which allows attackers to execute arbitrary code via a crafted BANK record that leads to a buffer overflow.
	</description>
 </metadata>
<!-- cd828eb9d951041e00c2311802ef70a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3562</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3565</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3566</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
	</description>
 </metadata>
<!-- cd828eb9d951041e00c2311802ef70a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3568</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3569</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3571</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- 95815b521b62658697365ff982d3f827 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066162" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066163" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066164" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066165" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3572</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4d8a8a0137799e50a1379f2cfce0934b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065193" comment="IBMJava2-JRE less than 1.4.2_sr13.6-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065194" comment="IBMJava2-SDK less than 1.4.2_sr13.6-0.7"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3573</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
<!-- cd828eb9d951041e00c2311802ef70a5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3574</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 590230b30e60bc28e0cacab0ea3befd2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065614" comment="IBMJava2-JRE less than 1.4.2_sr13.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065615" comment="IBMJava2-JRE less than 1.4.2_sr13.8-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065616" comment="IBMJava2-SDK less than 1.4.2_sr13.8-0.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065617" comment="IBMJava2-SDK less than 1.4.2_sr13.8-0.7"/>
		</criteria>
	</criteria>
	<!-- 8ced63d62f393423811b2263af4bc085 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066022" comment="IBMJava2-JRE less than 1.4.2_sr13.8-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066023" comment="IBMJava2-SDK less than 1.4.2_sr13.8-0.15"/>
		</criteria>
	</criteria>
	<!-- cd828eb9d951041e00c2311802ef70a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064558" comment="IBMJava5-JRE less than 1.5.0_sr12.2-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064559" comment="IBMJava5-SDK less than 1.5.0_sr12.2-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3681</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3681" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
	</description>
 </metadata>
<!-- ed744ae038fa991b8d68cfc1c5b0b76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064246" comment="mysql-Max less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064247" comment="mysql-client less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064248" comment="mysql-devel less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064249" comment="mysql-shared less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064250" comment="mysql less than 4.0.18-32.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3683</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3683" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
	</description>
 </metadata>
<!-- ed744ae038fa991b8d68cfc1c5b0b76a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064246" comment="mysql-Max less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064247" comment="mysql-client less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064248" comment="mysql-devel less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064249" comment="mysql-shared less than 4.0.18-32.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064250" comment="mysql less than 4.0.18-32.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3702</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" source="CVE"/>
	<description>
	The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
	</description>
 </metadata>
<!-- 9f4e1141cc45321d6bd8440284309eae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064781" comment="cups-client less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064782" comment="cups-devel less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064783" comment="cups-libs-32bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064784" comment="cups-libs-64bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064785" comment="cups-libs-x86 less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064786" comment="cups-libs less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064787" comment="cups less than 1.1.20-108.65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3703</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" source="CVE"/>
	<description>
	The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference.
	</description>
 </metadata>
<!-- 9f4e1141cc45321d6bd8440284309eae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064781" comment="cups-client less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064782" comment="cups-devel less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064783" comment="cups-libs-32bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064784" comment="cups-libs-64bit less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064785" comment="cups-libs-x86 less than 9-201010271353"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064786" comment="cups-libs less than 1.1.20-108.65"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064787" comment="cups less than 1.1.20-108.65"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3718</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3718" source="CVE"/>
	<description>
	Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
	</description>
 </metadata>
<!-- e04366168918d603effaf9735d6043c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066170" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066171" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066172" comment="jakarta-tomcat-doc less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066173" comment="jakarta-tomcat-examples less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066174" comment="jakarta-tomcat less than 5.0.19-29.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3848</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3848" source="CVE"/>
	<description>
	Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3849</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3849" source="CVE"/>
	<description>
	The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3850</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3850" source="CVE"/>
	<description>
	The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3873</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873" source="CVE"/>
	<description>
	The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4072</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072" source="CVE"/>
	<description>
	The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4073</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073" source="CVE"/>
	<description>
	The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4081</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4081" source="CVE"/>
	<description>
	The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4083</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083" source="CVE"/>
	<description>
	The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4157</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4157" source="CVE"/>
	<description>
	Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4158</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158" source="CVE"/>
	<description>
	The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4160</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4160" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4164</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164" source="CVE"/>
	<description>
	Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4180</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180" source="CVE"/>
	<description>
	OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
	</description>
 </metadata>
<!-- 14dae2a7d7e25ce3f2b3cd8319584d09 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067912" comment="openssl-32bit less than 9-201104111436"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067913" comment="openssl-32bit less than 9-201104111441"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067914" comment="openssl-64bit less than 9-201104111445"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067915" comment="openssl-devel-32bit less than 9-201104111436"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067916" comment="openssl-devel-32bit less than 9-201104111441"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067917" comment="openssl-devel-64bit less than 9-201104111445"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067918" comment="openssl-devel less than 0.9.7d-15.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067919" comment="openssl-doc less than 0.9.7d-15.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067920" comment="openssl-x86 less than 9-201104111436"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067921" comment="openssl less than 0.9.7d-15.46"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4242</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4242" source="CVE"/>
	<description>
	The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4258</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258" source="CVE"/>
	<description>
	The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- e2507a53caccb07cb35e22d50f800e8a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065849" comment="python-xml less than 2.3.3-88.29"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4260</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4260" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV before 0.96.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, aka (1) "bb #2358" and (2) "bb #2396."
	</description>
 </metadata>
<!-- 8f40e47beba9d2cf505330a0db9294fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064951" comment="clamav less than 0.96.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4261</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4261" source="CVE"/>
	<description>
	Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 8f40e47beba9d2cf505330a0db9294fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064951" comment="clamav less than 0.96.5-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4342</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342" source="CVE"/>
	<description>
	The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4447</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4447" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4448</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4448" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue involves "DNS cache poisoning by untrusted applets."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4450</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4450" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows local standalone applications to affect confidentiality, integrity, and availability via unknown vectors related to Launcher.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is an untrusted search path vulnerability involving an empty LD_LIBRARY_PATH environment variable.
	</description>
 </metadata>
<!-- f7717009474c7d09de34c40ae6df90de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4454</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4454" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4462</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4462" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4465</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4465" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or "clipboard access in Applets."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4466</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4466" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, Solaris, and, Linux; 5.0 Update 27 and earlier for Windows; and 1.4.2_29 and earlier for Windows allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4468</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4468" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to JDBC.
	</description>
 </metadata>
<!-- f7717009474c7d09de34c40ae6df90de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4471</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4471" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.
	</description>
 </metadata>
<!-- f7717009474c7d09de34c40ae6df90de -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4473</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4473" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4475</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4475" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- f7717009474c7d09de34c40ae6df90de -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066674" comment="IBMJava5-JRE less than 1.5.0_sr12.4-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066675" comment="IBMJava5-SDK less than 1.5.0_sr12.4-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4476</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476" source="CVE"/>
	<description>
	The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 271e25b837a34f71f9e296a3e6913eee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
		</criteria>
	</criteria>
	<!-- 8ced63d62f393423811b2263af4bc085 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066022" comment="IBMJava2-JRE less than 1.4.2_sr13.8-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066023" comment="IBMJava2-SDK less than 1.4.2_sr13.8-0.15"/>
		</criteria>
	</criteria>
	<!-- 95815b521b62658697365ff982d3f827 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066162" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066163" comment="IBMJava5-JRE less than 1.5.0_sr12.3-0.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066164" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066165" comment="IBMJava5-SDK less than 1.5.0_sr12.3-0.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4527</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527" source="CVE"/>
	<description>
	The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4529</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4529" source="CVE"/>
	<description>
	Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c504394fbd3ce23ff9487901889cc49 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065746" comment="kernel-s390x-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065747" comment="kernel-s390x less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 578023f41ae49bb337d16ed1474c8ad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065751" comment="kernel-iseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065752" comment="kernel-pmac64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065753" comment="kernel-pseries64 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 6d006dd073488d541d0a501ab1142715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065755" comment="kernel-64k-pagesize less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065757" comment="kernel-sn2 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
	<!-- 7065a00fe307e86727b6c0854c97534d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- 80a4ec55c123f8a2b2753c6904d9d935 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065760" comment="kernel-bigsmp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065756" comment="kernel-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065750" comment="kernel-default less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065754" comment="kernel-smp less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065761" comment="kernel-um less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065758" comment="kernel-xen less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065762" comment="kernel-xenpae less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065763" comment="um-host-install-initrd less than 1.0-48.38"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065764" comment="um-host-kernel less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065759" comment="xen-kmp less than 3.0.4_2.6.5_7.325-0.2"/>
		</criteria>
	</criteria>
	<!-- b2a65cd0e6de1dca9b9b012cbd0c452f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065765" comment="kernel-s390-debug less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065766" comment="kernel-s390 less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065748" comment="kernel-source less than 2.6.5-7.325"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065749" comment="kernel-syms less than 2.6.5-7.325"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
	<description>
	Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
	</description>
 </metadata>
<!-- e9e188100a0623507435b06b15630ed4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067922" comment="libtiff-32bit less than 9-201104151522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067923" comment="libtiff-32bit less than 9-201104151524"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067924" comment="libtiff-64bit less than 9-201104151527"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067925" comment="libtiff-x86 less than 9-201104151522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067926" comment="libtiff less than 3.6.1-38.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0013</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0013" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
	</description>
 </metadata>
<!-- e04366168918d603effaf9735d6043c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066170" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066171" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066172" comment="jakarta-tomcat-doc less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066173" comment="jakarta-tomcat-examples less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066174" comment="jakarta-tomcat less than 5.0.19-29.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0191</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0191" source="CVE"/>
	<description>
	Buffer overflow in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.
	</description>
 </metadata>
<!-- de4e2b93086578dd14a5e37c1d756842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066175" comment="libtiff-32bit less than 9-201102281644"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066176" comment="libtiff-32bit less than 9-201102281646"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066177" comment="libtiff-64bit less than 9-201102281648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066178" comment="libtiff-x86 less than 9-201102281644"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066179" comment="libtiff less than 3.6.1-38.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
	<description>
	Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- de4e2b93086578dd14a5e37c1d756842 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066175" comment="libtiff-32bit less than 9-201102281644"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066176" comment="libtiff-32bit less than 9-201102281646"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066177" comment="libtiff-64bit less than 9-201102281648"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066178" comment="libtiff-x86 less than 9-201102281644"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066179" comment="libtiff less than 3.6.1-38.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0311</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0311" source="CVE"/>
	<description>
	The class file parser in IBM Java before 1.4.2 SR13 FP9, as used in IBM Runtimes for Java Technology 5.0.0 before SR13 and 6.0.0 before SR10, allows remote authenticated users to cause a denial of service (JVM segmentation fault, and possibly memory consumption or an infinite loop) via a crafted attribute length field in a class file, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- 271e25b837a34f71f9e296a3e6913eee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068389" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068390" comment="IBMJava2-JRE less than 1.4.2_sr13.9-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068391" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068392" comment="IBMJava2-SDK less than 1.4.2_sr13.9-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0411</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0411" source="CVE"/>
	<description>
	The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
	</description>
 </metadata>
<!-- b69b570191513e37ab678b2837e63bb1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068358" comment="postfix less than 2.1.1-1.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
	<description>
	xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
	</description>
 </metadata>
<!-- 038c28da0d9079018f1a5bee20fcee76 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067224" comment="XFree86-Mesa-32bit less than 9-201104080857"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067225" comment="XFree86-Mesa-32bit less than 9-201104080901"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067226" comment="XFree86-Mesa-64bit less than 9-201104080937"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067227" comment="XFree86-Mesa-devel-32bit less than 9-201104080857"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067228" comment="XFree86-Mesa-devel-32bit less than 9-201104080901"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067229" comment="XFree86-Mesa-devel-64bit less than 9-201104080937"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067230" comment="XFree86-Mesa-devel less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067231" comment="XFree86-Mesa-x86 less than 9-201104080857"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067232" comment="XFree86-Mesa less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067233" comment="XFree86-Xnest less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067234" comment="XFree86-Xprt less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067235" comment="XFree86-Xvfb less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067236" comment="XFree86-Xvnc less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067237" comment="XFree86-devel-32bit less than 9-201104080857"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067238" comment="XFree86-devel-32bit less than 9-201104080901"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067239" comment="XFree86-devel-64bit less than 9-201104080937"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067240" comment="XFree86-devel less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067241" comment="XFree86-doc less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067242" comment="XFree86-driver-options less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067243" comment="XFree86-fonts-100dpi less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067244" comment="XFree86-fonts-75dpi less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067245" comment="XFree86-fonts-cyrillic less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067246" comment="XFree86-fonts-scalable less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067247" comment="XFree86-fonts-syriac less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067248" comment="XFree86-libs-32bit less than 9-201104080857"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067249" comment="XFree86-libs-32bit less than 9-201104080901"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067250" comment="XFree86-libs-64bit less than 9-201104080937"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067251" comment="XFree86-libs-x86 less than 9-201104080857"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067252" comment="XFree86-libs less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067253" comment="XFree86-man less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067254" comment="XFree86-server-glx less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067255" comment="XFree86-server less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067256" comment="XFree86 less than 4.3.99.902-43.105"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067257" comment="km_drm less than 4.3.99.902-43.105"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0534</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0534" source="CVE"/>
	<description>
	Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
	</description>
 </metadata>
<!-- e04366168918d603effaf9735d6043c0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066170" comment="apache-jakarta-tomcat-connectors less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066171" comment="apache2-jakarta-tomcat-connectors less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066172" comment="jakarta-tomcat-doc less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066173" comment="jakarta-tomcat-examples less than 5.0.19-29.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066174" comment="jakarta-tomcat less than 5.0.19-29.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0536</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0536" source="CVE"/>
	<description>
	Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847.
	</description>
 </metadata>
<!-- 591d027112ae2faaabb4f18e60c09fbb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069125" comment="glibc-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069126" comment="glibc-32bit less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069127" comment="glibc-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069128" comment="glibc-devel-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069129" comment="glibc-devel-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069130" comment="glibc-devel-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069131" comment="glibc-devel less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069132" comment="glibc-html less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069133" comment="glibc-i18ndata less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069134" comment="glibc-info less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069135" comment="glibc-locale-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069136" comment="glibc-locale-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069137" comment="glibc-locale-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069138" comment="glibc-locale-x86 less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069139" comment="glibc-locale less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069140" comment="glibc-profile-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069141" comment="glibc-profile less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069142" comment="glibc-x86 less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069143" comment="glibc less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069144" comment="nscd less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069145" comment="timezone less than 2.3.3-98.121"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
	<description>
	Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
	</description>
 </metadata>
<!-- 4784ec0bf0aa3ba19ff4c1b683bbf7a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070147" comment="libsmbclient-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070148" comment="libsmbclient-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070149" comment="libsmbclient-64bit less than 9-201107300252"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070150" comment="libsmbclient-devel less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070151" comment="libsmbclient less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070152" comment="samba-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070153" comment="samba-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070154" comment="samba-client-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070155" comment="samba-client-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070156" comment="samba-client less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070157" comment="samba-doc less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070158" comment="samba-pdb less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070159" comment="samba-python less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070160" comment="samba-vscan less than 0.3.6b-0.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070161" comment="samba-winbind-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070162" comment="samba-winbind-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070163" comment="samba-winbind less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070164" comment="samba less than 3.0.26a-0.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0762</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0762" source="CVE"/>
	<description>
	The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
	</description>
 </metadata>
<!-- a976620af4e2b0fa6f058bab18d9ee9c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068329" comment="vsftpd less than 2.0.4-0.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0786</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0786" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2011-0788.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0802</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0802" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0814</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0814" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0815</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0815" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0862</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0862" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0865</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0865" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0866</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0866" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Java Runtime Environment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0867</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0867" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0871</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0871" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0872</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0872" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect availability via unknown vectors related to NIO.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7886de0d893190600803b61d082cc3cf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070094" comment="IBMJava2-JRE less than 1.4.2_sr13.10-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070095" comment="IBMJava2-SDK less than 1.4.2_sr13.10-0.7"/>
		</criteria>
	</criteria>
	<!-- daac3f2447217cb1cc0ac6468eb37edc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0873</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0873" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
<!-- daac3f2447217cb1cc0ac6468eb37edc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069727" comment="IBMJava5-JRE less than 1.5.0_sr12.5-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069728" comment="IBMJava5-SDK less than 1.5.0_sr12.5-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0996</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0996" source="CVE"/>
	<description>
	dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 062db2d8239e7bfe30cac469f65694f4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067004" comment="dhcp-client less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067005" comment="dhcp-devel less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067006" comment="dhcp-relay less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067007" comment="dhcp-server less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067008" comment="dhcp less than 3.0.1rc13-28.29"/>
		</criteria>
	</criteria>
	<!-- 62705804cfa1fe04cd63ae7b219766c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067927" comment="dhcp6 less than 0.10-18.8"/>
	</criteria>
	<!-- 75e4866972516e17f52967a50d4b76bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067009" comment="dhcpcd less than 1.3.22pl4-193.19"/>
	</criteria>
	<!-- ad848aa99325481552899b84d0f82433 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066954" comment="dhcpcd less than 1.3.22pl4-193.17"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
	<description>
	dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 062db2d8239e7bfe30cac469f65694f4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067004" comment="dhcp-client less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067005" comment="dhcp-devel less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067006" comment="dhcp-relay less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067007" comment="dhcp-server less than 3.0.1rc13-28.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067008" comment="dhcp less than 3.0.1rc13-28.29"/>
		</criteria>
	</criteria>
	<!-- 62705804cfa1fe04cd63ae7b219766c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067927" comment="dhcp6 less than 0.10-18.8"/>
	</criteria>
	<!-- 75e4866972516e17f52967a50d4b76bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067009" comment="dhcpcd less than 1.3.22pl4-193.19"/>
	</criteria>
	<!-- ad848aa99325481552899b84d0f82433 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066954" comment="dhcpcd less than 1.3.22pl4-193.17"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1071</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071" source="CVE"/>
	<description>
	The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.
	</description>
 </metadata>
<!-- 591d027112ae2faaabb4f18e60c09fbb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069125" comment="glibc-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069126" comment="glibc-32bit less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069127" comment="glibc-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069128" comment="glibc-devel-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069129" comment="glibc-devel-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069130" comment="glibc-devel-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069131" comment="glibc-devel less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069132" comment="glibc-html less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069133" comment="glibc-i18ndata less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069134" comment="glibc-info less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069135" comment="glibc-locale-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069136" comment="glibc-locale-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069137" comment="glibc-locale-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069138" comment="glibc-locale-x86 less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069139" comment="glibc-locale less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069140" comment="glibc-profile-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069141" comment="glibc-profile less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069142" comment="glibc-x86 less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069143" comment="glibc less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069144" comment="nscd less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069145" comment="timezone less than 2.3.3-98.121"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1095</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095" source="CVE"/>
	<description>
	locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function.
	</description>
 </metadata>
<!-- 591d027112ae2faaabb4f18e60c09fbb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069125" comment="glibc-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069126" comment="glibc-32bit less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069127" comment="glibc-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069128" comment="glibc-devel-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069129" comment="glibc-devel-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069130" comment="glibc-devel-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069131" comment="glibc-devel less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069132" comment="glibc-html less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069133" comment="glibc-i18ndata less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069134" comment="glibc-info less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069135" comment="glibc-locale-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069136" comment="glibc-locale-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069137" comment="glibc-locale-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069138" comment="glibc-locale-x86 less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069139" comment="glibc-locale less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069140" comment="glibc-profile-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069141" comment="glibc-profile less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069142" comment="glibc-x86 less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069143" comment="glibc less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069144" comment="nscd less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069145" comment="timezone less than 2.3.3-98.121"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
	<description>
	Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
	</description>
 </metadata>
<!-- e9e188100a0623507435b06b15630ed4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009067922" comment="libtiff-32bit less than 9-201104151522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067923" comment="libtiff-32bit less than 9-201104151524"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067924" comment="libtiff-64bit less than 9-201104151527"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067925" comment="libtiff-x86 less than 9-201104151522"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009067926" comment="libtiff less than 3.6.1-38.48"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
	<description>
	The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
	</description>
 </metadata>
<!-- fd009232bd8495d40774753a4be8cc7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068719" comment="ethereal less than 0.10.13-2.49"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1659</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659" source="CVE"/>
	<description>
	Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.
	</description>
 </metadata>
<!-- 591d027112ae2faaabb4f18e60c09fbb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069125" comment="glibc-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069126" comment="glibc-32bit less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069127" comment="glibc-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069128" comment="glibc-devel-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069129" comment="glibc-devel-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069130" comment="glibc-devel-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069131" comment="glibc-devel less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069132" comment="glibc-html less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069133" comment="glibc-i18ndata less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069134" comment="glibc-info less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069135" comment="glibc-locale-32bit less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069136" comment="glibc-locale-32bit less than 9-201106161649"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069137" comment="glibc-locale-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069138" comment="glibc-locale-x86 less than 9-201106161606"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069139" comment="glibc-locale less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069140" comment="glibc-profile-64bit less than 9-201106161725"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069141" comment="glibc-profile less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069142" comment="glibc-x86 less than 9-201106161950"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069143" comment="glibc less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069144" comment="nscd less than 2.3.3-98.121"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069145" comment="timezone less than 2.3.3-98.121"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1720</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1720" source="CVE"/>
	<description>
	The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
	</description>
 </metadata>
<!-- b69b570191513e37ab678b2837e63bb1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068358" comment="postfix less than 2.1.1-1.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1926</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1926" source="CVE"/>
	<description>
	The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
	</description>
 </metadata>
<!-- 8a730ac5513fedc3481a8f98399f77ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069446" comment="cyrus-imapd-devel less than 2.2.3-83.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069447" comment="cyrus-imapd less than 2.2.3-83.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069448" comment="perl-Cyrus-IMAP less than 2.2.3-83.44"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069449" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.3-83.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
	<description>
	crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
	</description>
 </metadata>
<!-- 9461d1e81594a5e74d3886c3bbeb79ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069863" comment="glibc-32bit less than 9-201107291757"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069864" comment="glibc-32bit less than 9-201108011005"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069865" comment="glibc-64bit less than 9-201107291812"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069866" comment="glibc-devel-32bit less than 9-201107291651"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069867" comment="glibc-devel-32bit less than 9-201107291757"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069868" comment="glibc-devel-64bit less than 9-201107291812"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069869" comment="glibc-devel less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069870" comment="glibc-html less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069871" comment="glibc-i18ndata less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069872" comment="glibc-info less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069873" comment="glibc-locale-32bit less than 9-201107291651"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069874" comment="glibc-locale-32bit less than 9-201107291757"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069875" comment="glibc-locale-64bit less than 9-201107291812"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069876" comment="glibc-locale-x86 less than 9-201107291651"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069877" comment="glibc-locale less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069878" comment="glibc-profile-64bit less than 9-201107291812"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069879" comment="glibc-profile less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069880" comment="glibc-x86 less than 9-201108011005"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069881" comment="glibc less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069882" comment="libxcrypt-32bit less than 9-201107291733"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069883" comment="libxcrypt-32bit less than 9-201107292136"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069884" comment="libxcrypt-64bit less than 9-201107292059"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069885" comment="libxcrypt-devel less than 2.1.90-61.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069886" comment="libxcrypt-x86 less than 9-201107291733"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069887" comment="libxcrypt less than 2.1.90-61.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069888" comment="nscd less than 2.3.3-98.123"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069889" comment="pam-modules-32bit less than 9-201107291830"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069890" comment="pam-modules-32bit less than 9-201107310656"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069891" comment="pam-modules-64bit less than 9-201107300859"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069892" comment="pam-modules-x86 less than 9-201107291830"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069893" comment="pam-modules less than 9-18.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069894" comment="pwdutils less than 2.6.4-2.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069895" comment="timezone less than 2.3.3-98.123"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
	<description>
	The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
	</description>
 </metadata>
<!-- eedf4535799480b79d05b758a184b9ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069808" comment="libpng-32bit less than 9-201108021633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069809" comment="libpng-32bit less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069810" comment="libpng-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069811" comment="libpng-devel-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069812" comment="libpng-devel less than 1.2.5-182.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069813" comment="libpng-x86 less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069814" comment="libpng less than 1.2.5-182.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
	<description>
	Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
	</description>
 </metadata>
<!-- 4784ec0bf0aa3ba19ff4c1b683bbf7a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070147" comment="libsmbclient-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070148" comment="libsmbclient-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070149" comment="libsmbclient-64bit less than 9-201107300252"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070150" comment="libsmbclient-devel less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070151" comment="libsmbclient less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070152" comment="samba-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070153" comment="samba-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070154" comment="samba-client-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070155" comment="samba-client-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070156" comment="samba-client less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070157" comment="samba-doc less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070158" comment="samba-pdb less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070159" comment="samba-python less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070160" comment="samba-vscan less than 0.3.6b-0.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070161" comment="samba-winbind-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070162" comment="samba-winbind-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070163" comment="samba-winbind less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070164" comment="samba less than 3.0.26a-0.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
	<description>
	Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
	</description>
 </metadata>
<!-- eedf4535799480b79d05b758a184b9ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069808" comment="libpng-32bit less than 9-201108021633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069809" comment="libpng-32bit less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069810" comment="libpng-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069811" comment="libpng-devel-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069812" comment="libpng-devel less than 1.2.5-182.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069813" comment="libpng-x86 less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069814" comment="libpng less than 1.2.5-182.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
	<description>
	The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
	</description>
 </metadata>
<!-- eedf4535799480b79d05b758a184b9ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069808" comment="libpng-32bit less than 9-201108021633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069809" comment="libpng-32bit less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069810" comment="libpng-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069811" comment="libpng-devel-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069812" comment="libpng-devel less than 1.2.5-182.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069813" comment="libpng-x86 less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069814" comment="libpng less than 1.2.5-182.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
	<description>
	The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
	</description>
 </metadata>
<!-- eedf4535799480b79d05b758a184b9ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009069808" comment="libpng-32bit less than 9-201108021633"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069809" comment="libpng-32bit less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069810" comment="libpng-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069811" comment="libpng-devel-64bit less than 9-201108021636"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069812" comment="libpng-devel less than 1.2.5-182.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069813" comment="libpng-x86 less than 9-201108021634"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009069814" comment="libpng less than 1.2.5-182.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
	</description>
 </metadata>
<!-- 4784ec0bf0aa3ba19ff4c1b683bbf7a9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009070147" comment="libsmbclient-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070148" comment="libsmbclient-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070149" comment="libsmbclient-64bit less than 9-201107300252"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070150" comment="libsmbclient-devel less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070151" comment="libsmbclient less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070152" comment="samba-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070153" comment="samba-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070154" comment="samba-client-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070155" comment="samba-client-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070156" comment="samba-client less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070157" comment="samba-doc less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070158" comment="samba-pdb less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070159" comment="samba-python less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070160" comment="samba-vscan less than 0.3.6b-0.47"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070161" comment="samba-winbind-32bit less than 9-201107292007"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070162" comment="samba-winbind-32bit less than 9-201107302056"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070163" comment="samba-winbind less than 3.0.26a-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070164" comment="samba less than 3.0.26a-0.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
	<description>
	foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
	</description>
 </metadata>
<!-- ba1e4da567bd144e5c88b67f95436885 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070710" comment="foomatic-filters less than 3.0.1-41.13"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
	<description>
	Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
	</description>
 </metadata>
<!-- ed36f73ad5096e19cd55aef1512806fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070028" comment="clamav less than 0.97.2-1.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2964</title>
	<affected family="unix">
		<platform>SUSE CORE 9 for AMD64 and Intel EM64T</platform>
		<platform>SUSE CORE 9 for IBM POWER</platform>
		<platform>SUSE CORE 9 for IBM S/390 31bit</platform>
		<platform>SUSE CORE 9 for IBM zSeries 64bit</platform>
		<platform>SUSE CORE 9 for Itanium Processor Family</platform>
		<platform>SUSE CORE 9 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2964" source="CVE"/>
	<description>
	foomaticrip.c in foomatic-rip in foomatic-filters in Foomatic 4.0.6 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file, a different vulnerability than CVE-2011-2697.
	</description>
 </metadata>
<!-- ba1e4da567bd144e5c88b67f95436885 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009032403" comment="core9 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070710" comment="foomatic-filters less than 3.0.1-41.13"/>
</criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032403" version="1" comment="sles-release is ==9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030401" version="1" comment="tar is &lt;1.13.25-325.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030402" version="1" comment="tar is &lt;1.13.25-325.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032404" version="1" comment="apache2-devel is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032405" version="1" comment="apache2-doc is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032406" version="1" comment="apache2-example-pages is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032407" version="1" comment="apache2-prefork is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032408" version="1" comment="apache2-worker is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032409" version="1" comment="apache2 is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030403" version="1" comment="libapr0 is &lt;2.0.59-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030404" version="1" comment="openssh is &lt;3.8p1-37.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030405" version="1" comment="iproute2 is &lt;2.4.7-866.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032410" version="1" comment="libxml2-32bit is &lt;9-200412202049" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032411" version="1" comment="libxml2-32bit is &lt;9-200412202205" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032412" version="1" comment="libxml2-64bit is &lt;9-200412202113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030406" version="1" comment="libxml2-devel is &lt;2.6.7-28.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032413" version="1" comment="libxml2-x86 is &lt;9-200412202214" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030407" version="1" comment="libxml2 is &lt;2.6.7-28.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032414" version="1" comment="libxml-32bit is &lt;9-200412202049" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032415" version="1" comment="libxml-32bit is &lt;9-200412202205" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032416" version="1" comment="libxml-64bit is &lt;9-200412202113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030409" version="1" comment="libxml-devel is &lt;1.8.17-366.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032417" version="1" comment="libxml-x86 is &lt;9-200412202214" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030410" version="1" comment="libxml is &lt;1.8.17-366.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032418" version="1" comment="perl-32bit is &lt;9-200502051955" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032419" version="1" comment="perl-32bit is &lt;9-200502060348" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032420" version="1" comment="perl-64bit is &lt;9-200502060420" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032421" version="1" comment="perl-x86 is &lt;9-200502051945" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030411" version="1" comment="perl is &lt;5.8.3-32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032422" version="1" comment="mysql is &lt;4.0.18-32.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032423" version="1" comment="mc is &lt;4.6.0-324.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032424" version="1" comment="gnome-vfs is &lt;1.0.5-806.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032425" version="1" comment="gnome-vfs2-32bit is &lt;9-200504131658" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032426" version="1" comment="gnome-vfs2-32bit is &lt;9-200504132031" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032427" version="1" comment="gnome-vfs2-64bit is &lt;9-200504131529" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032428" version="1" comment="gnome-vfs2-doc is &lt;2.4.2-68.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032429" version="1" comment="gnome-vfs2 is &lt;2.4.2-68.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032430" version="1" comment="gnome-vfs is &lt;1.0.5-806.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032431" version="1" comment="ethereal is &lt;0.10.3-15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032432" version="1" comment="cups-client is &lt;1.1.20-108.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032433" version="1" comment="cups-devel is &lt;1.1.20-108.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032434" version="1" comment="cups-libs-32bit is &lt;9-200408311758" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032435" version="1" comment="cups-libs-32bit is &lt;9-200408311952" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032436" version="1" comment="cups-libs-64bit is &lt;9-200408312018" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032437" version="1" comment="cups-libs-x86 is &lt;9-200408311747" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032438" version="1" comment="cups-libs is &lt;1.1.20-108.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032439" version="1" comment="cups is &lt;1.1.20-108.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032440" version="1" comment="foomatic-filters is &lt;3.0.1-41.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032441" version="1" comment="libpng-32bit is &lt;9-200407192204" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032442" version="1" comment="libpng-32bit is &lt;9-200407192329" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032443" version="1" comment="libpng-64bit is &lt;9-200407211228" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032444" version="1" comment="libpng-x86 is &lt;9-200407192328" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032445" version="1" comment="libpng is &lt;1.2.5-182.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032446" version="1" comment="libsmbclient-32bit is &lt;9-200407211117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032447" version="1" comment="libsmbclient-32bit is &lt;9-200407211155" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032448" version="1" comment="libsmbclient-64bit is &lt;9-200407211228" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032449" version="1" comment="libsmbclient-devel is &lt;3.0.4-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032450" version="1" comment="libsmbclient is &lt;3.0.4-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032451" version="1" comment="samba-client is &lt;3.0.4-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032452" version="1" comment="samba-pdb is &lt;3.0.4-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032453" version="1" comment="samba-python is &lt;3.0.4-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032454" version="1" comment="samba-winbind is &lt;3.0.4-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032455" version="1" comment="samba is &lt;3.0.4-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032456" version="1" comment="acroread is &lt;5.09-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032457" version="1" comment="ethereal is &lt;0.10.3-15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032458" version="1" comment="pure-ftpd is &lt;1.0.18-39.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032459" version="1" comment="openmotif-devel-32bit is &lt;9-200410031617" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032460" version="1" comment="openmotif-devel-32bit is &lt;9-200410031928" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032461" version="1" comment="openmotif-devel-64bit is &lt;9-200410031619" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032462" version="1" comment="openmotif-devel is &lt;2.2.2-519.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032463" version="1" comment="openmotif is &lt;2.2.2-519.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032464" version="1" comment="XFree86-libs-32bit is &lt;9-200411100109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032465" version="1" comment="XFree86-libs-32bit is &lt;9-200411100704" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032466" version="1" comment="XFree86-libs-64bit is &lt;9-200411100528" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032467" version="1" comment="XFree86-libs-x86 is &lt;9-200411100318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030415" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032468" version="1" comment="openmotif-devel-32bit is &lt;9-200410081851" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032469" version="1" comment="openmotif-devel-32bit is &lt;9-200410082201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032470" version="1" comment="openmotif-devel-64bit is &lt;9-200410082105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032471" version="1" comment="openmotif-libs-32bit is &lt;9-200410081851" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032472" version="1" comment="openmotif-libs-32bit is &lt;9-200410082201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032473" version="1" comment="openmotif-libs-64bit is &lt;9-200410082105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032474" version="1" comment="openmotif-libs is &lt;2.2.2-519.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032475" version="1" comment="openmotif21-libs is &lt;2.1.30MLI4-119.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032476" version="1" comment="XFree86-libs-32bit is &lt;9-200409151952" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032477" version="1" comment="XFree86-libs-32bit is &lt;9-200409161634" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032478" version="1" comment="XFree86-libs-64bit is &lt;9-200409152030" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032479" version="1" comment="XFree86-libs-x86 is &lt;9-200409152035" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032480" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032481" version="1" comment="arts-32bit is &lt;9-200407271038" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032482" version="1" comment="arts-32bit is &lt;9-200407271118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032483" version="1" comment="arts-64bit is &lt;9-200407271122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032484" version="1" comment="arts-x86 is &lt;9-200407271036" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032485" version="1" comment="arts is &lt;1.2.1-35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032486" version="1" comment="kdebase3-32bit is &lt;9-200408111036" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032487" version="1" comment="kdebase3-32bit is &lt;9-200408111119" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032488" version="1" comment="kdebase3-64bit is &lt;9-200408111051" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032489" version="1" comment="kdebase3-devel is &lt;3.2.1-68.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032490" version="1" comment="kdebase3-x86 is &lt;9-200408111026" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032491" version="1" comment="kdebase3 is &lt;3.2.1-68.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032492" version="1" comment="kdelibs3-32bit is &lt;9-200408111036" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032493" version="1" comment="kdelibs3-32bit is &lt;9-200408111119" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032494" version="1" comment="kdelibs3-64bit is &lt;9-200408111051" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032495" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032496" version="1" comment="kdelibs3-x86 is &lt;9-200408111026" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032497" version="1" comment="kdelibs3 is &lt;3.2.1-44.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032498" version="1" comment="qt3-32bit is &lt;9-200408140621" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032499" version="1" comment="qt3-32bit is &lt;9-200408162047" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032500" version="1" comment="qt3-64bit is &lt;9-200408140912" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032501" version="1" comment="qt3-non-mt is &lt;3.3.1-41.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032502" version="1" comment="qt3-x86 is &lt;9-200408140621" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032503" version="1" comment="qt3 is &lt;3.3.1-36.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032504" version="1" comment="mod_ssl is &lt;2.8.16-71.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032505" version="1" comment="mozilla-calendar is &lt;1.6-74.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032506" version="1" comment="mozilla-dom-inspector is &lt;1.6-74.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032507" version="1" comment="mozilla-irc is &lt;1.6-74.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032508" version="1" comment="mozilla-mail is &lt;1.6-74.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032509" version="1" comment="mozilla-venkman is &lt;1.6-74.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032510" version="1" comment="mozilla is &lt;1.6-74.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032511" version="1" comment="apache2-devel is &lt;2.0.49-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032512" version="1" comment="apache2-doc is &lt;2.0.49-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032513" version="1" comment="apache2-example-pages is &lt;2.0.49-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032514" version="1" comment="apache2-prefork is &lt;2.0.49-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032515" version="1" comment="apache2-worker is &lt;2.0.49-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032516" version="1" comment="apache2 is &lt;2.0.49-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032517" version="1" comment="libapr0 is &lt;2.0.49-27.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032518" version="1" comment="apache2-devel is &lt;2.0.49-27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032519" version="1" comment="apache2-doc is &lt;2.0.49-27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032520" version="1" comment="apache2-example-pages is &lt;2.0.49-27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032521" version="1" comment="apache2-prefork is &lt;2.0.49-27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032522" version="1" comment="apache2-worker is &lt;2.0.49-27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032523" version="1" comment="apache2 is &lt;2.0.49-27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032524" version="1" comment="libapr0 is &lt;2.0.49-27.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032525" version="1" comment="lha is &lt;1.14i-547.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032526" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-62.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032527" version="1" comment="gdk-pixbuf-x86 is &lt;9-200409091658" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032528" version="1" comment="gdk-pixbuf is &lt;0.22.0-62.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032529" version="1" comment="gtk2-32bit is &lt;9-200409091701" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032530" version="1" comment="gtk2-32bit is &lt;9-200409091710" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032531" version="1" comment="gtk2-64bit is &lt;9-200409091646" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032532" version="1" comment="gtk2-devel is &lt;2.2.4-125.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032533" version="1" comment="gtk2-x86 is &lt;9-200409091658" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032534" version="1" comment="gtk2 is &lt;2.2.4-125.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032535" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032536" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-62.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032537" version="1" comment="gdk-pixbuf-gnome is &lt;0.22.0-62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032538" version="1" comment="gdk-pixbuf-gnome is &lt;0.22.0-62.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032539" version="1" comment="gdk-pixbuf-x86 is &lt;9-200409161502" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032540" version="1" comment="gdk-pixbuf is &lt;0.22.0-62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032541" version="1" comment="gdk-pixbuf is &lt;0.22.0-62.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032542" version="1" comment="rsync is &lt;2.6.2-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032543" version="1" comment="heimdal is &lt;0.6.1rc3-55.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032544" version="1" comment="spamassassin is &lt;2.64-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030416" version="1" comment="kdegraphics3-fax is &lt;3.2.1-67.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032545" version="1" comment="libtiff-32bit is &lt;9-200410202150" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032546" version="1" comment="libtiff-32bit is &lt;9-200410212027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032547" version="1" comment="libtiff-64bit is &lt;9-200410210007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032548" version="1" comment="libtiff-x86 is &lt;9-200410202139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032549" version="1" comment="libtiff is &lt;3.6.1-38.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032550" version="1" comment="samba-client is &lt;3.0.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032551" version="1" comment="samba-pdb is &lt;3.0.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032552" version="1" comment="samba-python is &lt;3.0.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032553" version="1" comment="samba-vscan is &lt;0.3.4-83.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032554" version="1" comment="samba-winbind is &lt;3.0.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032555" version="1" comment="samba is &lt;3.0.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032556" version="1" comment="mod_dav is &lt;1.0.3-377.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032557" version="1" comment="apache2-devel is &lt;2.0.49-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032558" version="1" comment="apache2-doc is &lt;2.0.49-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032559" version="1" comment="apache2-example-pages is &lt;2.0.49-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032560" version="1" comment="apache2-prefork is &lt;2.0.49-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032561" version="1" comment="apache2-worker is &lt;2.0.49-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032562" version="1" comment="apache2 is &lt;2.0.49-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032563" version="1" comment="libapr0 is &lt;2.0.49-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032564" version="1" comment="drbd is &lt;0.7.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032565" version="1" comment="km_drbd is &lt;0.7.5-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030417" version="1" comment="kernel-default is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030418" version="1" comment="kernel-smp is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030419" version="1" comment="kernel-source is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030420" version="1" comment="kernel-syms is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032566" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032567" version="1" comment="kernel-debug is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032568" version="1" comment="kernel-sn2 is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030421" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032569" version="1" comment="kernel-um is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032570" version="1" comment="um-host-install-initrd is &lt;1.0-48.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032571" version="1" comment="um-host-kernel is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032572" version="1" comment="kernel-s390 is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032573" version="1" comment="kernel-s390x is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032574" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032575" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032576" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032577" version="1" comment="imlib-32bit is &lt;9-200409021137" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032578" version="1" comment="imlib-32bit is &lt;9-200409021330" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032579" version="1" comment="imlib-64bit is &lt;9-200409021135" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032580" version="1" comment="imlib-devel is &lt;1.9.14-180.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032581" version="1" comment="imlib-x86 is &lt;9-200409021329" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032582" version="1" comment="imlib is &lt;1.9.14-180.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032583" version="1" comment="squid is &lt;2.5.STABLE5-42.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032584" version="1" comment="mysql is &lt;4.0.18-32.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030424" version="1" comment="mysql-Max is &lt;4.0.18-32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030425" version="1" comment="mysql is &lt;4.0.18-32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030428" version="1" comment="kernel-default is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030429" version="1" comment="kernel-smp is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030430" version="1" comment="kernel-source is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030431" version="1" comment="kernel-syms is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030427" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032585" version="1" comment="kernel-debug is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032586" version="1" comment="kernel-um is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032587" version="1" comment="um-host-install-initrd is &lt;1.0-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032588" version="1" comment="um-host-kernel is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032589" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032590" version="1" comment="kernel-sn2 is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032591" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032592" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032593" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032594" version="1" comment="kernel-s390 is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032595" version="1" comment="kernel-s390x is &lt;2.6.5-7.111.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032596" version="1" comment="cyrus-sasl-32bit is &lt;9-200410081851" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032597" version="1" comment="cyrus-sasl-32bit is &lt;9-200410082201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032598" version="1" comment="cyrus-sasl-64bit is &lt;9-200410082105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032599" version="1" comment="cyrus-sasl-devel-32bit is &lt;9-200410081851" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032600" version="1" comment="cyrus-sasl-devel-32bit is &lt;9-200410082201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032601" version="1" comment="cyrus-sasl-devel-64bit is &lt;9-200410082105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032602" version="1" comment="cyrus-sasl-devel is &lt;2.1.18-33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032603" version="1" comment="cyrus-sasl-x86 is &lt;9-200410081842" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032604" version="1" comment="cyrus-sasl is &lt;2.1.18-33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032605" version="1" comment="apache2-devel is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032606" version="1" comment="apache2-doc is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032607" version="1" comment="apache2-example-pages is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032608" version="1" comment="apache2-prefork is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032609" version="1" comment="apache2-worker is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032610" version="1" comment="apache2 is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030432" version="1" comment="libapr0 is &lt;2.0.49-27.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032611" version="1" comment="apache is &lt;1.3.29-71.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032612" version="1" comment="mod_ssl is &lt;2.8.16-71.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030433" version="1" comment="cups-client is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030434" version="1" comment="cups-devel is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032613" version="1" comment="cups-libs-32bit is &lt;9-200411082338" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032614" version="1" comment="cups-libs-32bit is &lt;9-200411090434" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032615" version="1" comment="cups-libs-64bit is &lt;9-200411090337" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032616" version="1" comment="cups-libs-x86 is &lt;9-200411082329" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030435" version="1" comment="cups-libs is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030436" version="1" comment="cups is &lt;1.1.20-108.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032617" version="1" comment="foomatic-filters is &lt;3.0.1-41.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032618" version="1" comment="mozilla-calendar is &lt;1.6-74.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032619" version="1" comment="mozilla-dom-inspector is &lt;1.6-74.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032620" version="1" comment="mozilla-irc is &lt;1.6-74.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032621" version="1" comment="mozilla-mail is &lt;1.6-74.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032622" version="1" comment="mozilla-venkman is &lt;1.6-74.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032623" version="1" comment="mozilla is &lt;1.6-74.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032624" version="1" comment="squid is &lt;2.5.STABLE5-42.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030437" version="1" comment="samba is &lt;3.0.4-1.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032625" version="1" comment="freeradius is &lt;0.9.3-106.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030438" version="1" comment="unarj is &lt;2.65-131.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030439" version="1" comment="ruby is &lt;1.8.1-42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032626" version="1" comment="iptables is &lt;1.2.9-95.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032627" version="1" comment="libxml2-32bit is &lt;9-200410281810" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032628" version="1" comment="libxml2-32bit is &lt;9-200410291429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032629" version="1" comment="libxml2-64bit is &lt;9-200410291649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032630" version="1" comment="libxml2-devel is &lt;2.6.7-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032631" version="1" comment="libxml2-x86 is &lt;9-200410291421" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032632" version="1" comment="libxml2 is &lt;2.6.7-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032633" version="1" comment="gd-devel is &lt;2.0.22-65.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032634" version="1" comment="gd is &lt;2.0.22-65.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030441" version="1" comment="mc is &lt;4.6.0-324.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030442" version="1" comment="zip is &lt;2.3-732.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032635" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032636" version="1" comment="kernel-debug is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030444" version="1" comment="kernel-default is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032637" version="1" comment="kernel-sn2 is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030446" version="1" comment="kernel-source is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030447" version="1" comment="kernel-syms is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030445" version="1" comment="kernel-smp is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032638" version="1" comment="kernel-s390 is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032639" version="1" comment="kernel-s390x is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032640" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032641" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032642" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030443" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032643" version="1" comment="kernel-um is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032644" version="1" comment="um-host-install-initrd is &lt;1.0-48.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032645" version="1" comment="um-host-kernel is &lt;2.6.5-7.111.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032646" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032647" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032648" version="1" comment="mod_php4-core is &lt;4.3.4-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032649" version="1" comment="php4-imap is &lt;4.3.4-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032650" version="1" comment="php4-mysql is &lt;4.3.4-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032651" version="1" comment="php4-session is &lt;4.3.4-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032652" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032653" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032654" version="1" comment="mod_php4-core is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032655" version="1" comment="php4-devel is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032656" version="1" comment="php4-exif is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032657" version="1" comment="php4-fastcgi is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032658" version="1" comment="php4-imap is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032659" version="1" comment="php4-mysql is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032660" version="1" comment="php4-pear is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032661" version="1" comment="php4-session is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032662" version="1" comment="php4-sysvshm is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032663" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032664" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032665" version="1" comment="mod_php4-core is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032666" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032667" version="1" comment="php4-devel is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032668" version="1" comment="php4-exif is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032669" version="1" comment="php4-fastcgi is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032670" version="1" comment="php4-imap is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032671" version="1" comment="php4-mysql is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032672" version="1" comment="php4-pear is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032673" version="1" comment="php4-session is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032674" version="1" comment="php4-sysvshm is &lt;4.3.4-43.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032675" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032676" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032677" version="1" comment="mod_php4-core is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032678" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032679" version="1" comment="php4-devel is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032680" version="1" comment="php4-exif is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032681" version="1" comment="php4-fastcgi is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032682" version="1" comment="php4-imap is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032683" version="1" comment="php4-mysql is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032684" version="1" comment="php4-pear is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032685" version="1" comment="php4-session is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032686" version="1" comment="php4-sysvshm is &lt;4.3.4-43.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032687" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032688" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032689" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032690" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032691" version="1" comment="mod_php4-core is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032692" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032693" version="1" comment="php4-devel is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032694" version="1" comment="php4-exif is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032695" version="1" comment="php4-fastcgi is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032696" version="1" comment="php4-imap is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032697" version="1" comment="php4-mysql is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032698" version="1" comment="php4-session is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032699" version="1" comment="php4-sysvshm is &lt;4.3.4-43.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032700" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032701" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032702" version="1" comment="mod_php4-core is &lt;4.3.4-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032703" version="1" comment="php4-imap is &lt;4.3.4-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032704" version="1" comment="php4-mysql is &lt;4.3.4-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032705" version="1" comment="php4-session is &lt;4.3.4-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032706" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032707" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032708" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032709" version="1" comment="mod_php4-core is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032710" version="1" comment="php4-devel is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032711" version="1" comment="php4-fastcgi is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032712" version="1" comment="php4-imap is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032713" version="1" comment="php4-mysql is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032714" version="1" comment="php4-session is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032715" version="1" comment="php4-sysvshm is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032716" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032717" version="1" comment="imlib-32bit is &lt;9-200411221740" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032718" version="1" comment="imlib-32bit is &lt;9-200411221926" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032719" version="1" comment="imlib-64bit is &lt;9-200411221819" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030448" version="1" comment="imlib-devel is &lt;1.9.14-180.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032720" version="1" comment="imlib-x86 is &lt;9-200411221914" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030449" version="1" comment="imlib is &lt;1.9.14-180.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030450" version="1" comment="java2-jre is &lt;1.4.2-129.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030451" version="1" comment="java2 is &lt;1.4.2-129.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032721" version="1" comment="ncpfs-devel is &lt;2.2.4-25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032722" version="1" comment="ncpfs is &lt;2.2.4-25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030452" version="1" comment="cups-client is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030453" version="1" comment="cups-devel is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032723" version="1" comment="cups-libs-32bit is &lt;9-200501280610" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032724" version="1" comment="cups-libs-32bit is &lt;9-200501281513" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032725" version="1" comment="cups-libs-64bit is &lt;9-200501280648" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032726" version="1" comment="cups-libs-x86 is &lt;9-200501280558" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030454" version="1" comment="cups-libs is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030455" version="1" comment="cups is &lt;1.1.20-108.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032727" version="1" comment="ethereal is &lt;0.10.3-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032728" version="1" comment="ethereal is &lt;0.10.3-15.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032729" version="1" comment="kdelibs3-32bit is &lt;9-200501242029" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032730" version="1" comment="kdelibs3-32bit is &lt;9-200501250047" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032731" version="1" comment="kdelibs3-64bit is &lt;9-200501242152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032732" version="1" comment="kdelibs3-x86 is &lt;9-200501242018" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030456" version="1" comment="kdelibs3 is &lt;3.2.1-44.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030457" version="1" comment="acroread is &lt;5.010-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032733" version="1" comment="libsmbclient-32bit is &lt;9-200412172026" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032734" version="1" comment="libsmbclient-32bit is &lt;9-200412172350" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032735" version="1" comment="libsmbclient-64bit is &lt;9-200412172257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030458" version="1" comment="libsmbclient-devel is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030459" version="1" comment="libsmbclient is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030460" version="1" comment="samba-client is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030461" version="1" comment="samba-doc is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030462" version="1" comment="samba-pdb is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030463" version="1" comment="samba-python is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030464" version="1" comment="samba-vscan is &lt;0.3.5-11.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030465" version="1" comment="samba-winbind is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030466" version="1" comment="samba is &lt;3.0.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032736" version="1" comment="kdebase3-32bit is &lt;9-200501242029" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032737" version="1" comment="kdebase3-32bit is &lt;9-200501250047" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032738" version="1" comment="kdebase3-64bit is &lt;9-200501242152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032739" version="1" comment="kdebase3-x86 is &lt;9-200501242018" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030467" version="1" comment="kdebase3 is &lt;3.2.1-68.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032740" version="1" comment="a2ps is &lt;4.13-1046.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030468" version="1" comment="mailman is &lt;2.1.4-83.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032741" version="1" comment="libtiff-32bit is &lt;9-200501041713" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032742" version="1" comment="libtiff-32bit is &lt;9-200501042255" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032743" version="1" comment="libtiff-64bit is &lt;9-200501041834" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032744" version="1" comment="libtiff-x86 is &lt;9-200501041705" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030470" version="1" comment="libtiff is &lt;3.6.1-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030471" version="1" comment="tiff is &lt;3.6.1-38.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030472" version="1" comment="enscript is &lt;1.6.2-814.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030475" version="1" comment="kernel-default is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030476" version="1" comment="kernel-smp is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030477" version="1" comment="kernel-source is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030478" version="1" comment="kernel-syms is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032745" version="1" comment="kernel-s390 is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032746" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032747" version="1" comment="kernel-debug is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032748" version="1" comment="kernel-sn2 is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032749" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032750" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032751" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030474" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032752" version="1" comment="kernel-um is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032753" version="1" comment="um-host-install-initrd is &lt;1.0-48.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032754" version="1" comment="um-host-kernel is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032755" version="1" comment="kernel-s390x is &lt;2.6.5-7.111.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032756" version="1" comment="file-32bit is &lt;9-200412071354" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032757" version="1" comment="file-32bit is &lt;9-200412071355" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032758" version="1" comment="file-64bit is &lt;9-200412071401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032759" version="1" comment="file-x86 is &lt;9-200412071353" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030479" version="1" comment="file is &lt;4.07-48.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032760" version="1" comment="ethereal is &lt;0.10.11-1.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030480" version="1" comment="wget is &lt;1.9.1-45.10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030481" version="1" comment="wget is &lt;1.9.1-45.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030482" version="1" comment="sharutils is &lt;4.2c-710.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030483" version="1" comment="snort is &lt;2.3.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032761" version="1" comment="xscreensaver is &lt;4.16-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032762" version="1" comment="resmgr-32bit is &lt;9-200410202150" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032763" version="1" comment="resmgr-32bit is &lt;9-200410212027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032764" version="1" comment="resmgr-64bit is &lt;9-200410210007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032765" version="1" comment="resmgr-x86 is &lt;9-200410202139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032766" version="1" comment="resmgr is &lt;0.9.8-47.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032767" version="1" comment="apache2-mod_python is &lt;3.1.3-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032768" version="1" comment="ncpfs-devel is &lt;2.2.4-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030484" version="1" comment="ncpfs is &lt;2.2.4-25.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030485" version="1" comment="perl-DBI is &lt;1.41-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030486" version="1" comment="htdig is &lt;3.1.6-402.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032769" version="1" comment="mod_python is &lt;2.7.10-83.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032770" version="1" comment="apache2-mod_python is &lt;3.1.3-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032771" version="1" comment="python-32bit is &lt;9-200502051955" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032772" version="1" comment="python-32bit is &lt;9-200502060348" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032773" version="1" comment="python-64bit is &lt;9-200502060420" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032774" version="1" comment="python-x86 is &lt;9-200502051945" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030487" version="1" comment="python is &lt;2.3.3-88.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032775" version="1" comment="squid is &lt;2.5.STABLE5-42.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030490" version="1" comment="unace is &lt;1.2b-621.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032776" version="1" comment="imap is &lt;2002e-92.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030491" version="1" comment="mailman is &lt;2.1.4-83.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032777" version="1" comment="squid is &lt;2.5.STABLE5-42.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030494" version="1" comment="postgresql-contrib is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030495" version="1" comment="postgresql-devel is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030496" version="1" comment="postgresql-docs is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032778" version="1" comment="postgresql-libs-32bit is &lt;9-200506061933" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032779" version="1" comment="postgresql-libs-32bit is &lt;9-200506062151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032780" version="1" comment="postgresql-libs-64bit is &lt;9-200506062057" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032781" version="1" comment="postgresql-libs-x86 is &lt;9-200506061918" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030497" version="1" comment="postgresql-libs is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030498" version="1" comment="postgresql-pl is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030499" version="1" comment="postgresql-server is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030500" version="1" comment="postgresql is &lt;7.4.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030501" version="1" comment="postgresql-contrib is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030502" version="1" comment="postgresql-devel is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030503" version="1" comment="postgresql-docs is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032782" version="1" comment="postgresql-libs-32bit is &lt;9-200504131658" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032783" version="1" comment="postgresql-libs-32bit is &lt;9-200504132031" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032784" version="1" comment="postgresql-libs-64bit is &lt;9-200504131529" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032785" version="1" comment="postgresql-libs-x86 is &lt;9-200504131636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030504" version="1" comment="postgresql-libs is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030505" version="1" comment="postgresql-pl is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030506" version="1" comment="postgresql-server is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030507" version="1" comment="postgresql is &lt;7.4.7-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032786" version="1" comment="squid is &lt;2.5.STABLE5-42.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030510" version="1" comment="gpg is &lt;1.2.4-68.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032787" version="1" comment="cyrus-sasl-32bit is &lt;9-200502182129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032788" version="1" comment="cyrus-sasl-32bit is &lt;9-200502182158" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032789" version="1" comment="cyrus-sasl-64bit is &lt;9-200502182226" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032790" version="1" comment="cyrus-sasl-x86 is &lt;9-200502182119" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030511" version="1" comment="cyrus-sasl is &lt;2.1.18-33.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030514" version="1" comment="kernel-default is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030515" version="1" comment="kernel-smp is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030516" version="1" comment="kernel-source is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030517" version="1" comment="kernel-syms is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032791" version="1" comment="kernel-s390x is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032792" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032793" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032794" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032795" version="1" comment="kernel-s390 is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032796" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032797" version="1" comment="kernel-debug is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032798" version="1" comment="kernel-sn2 is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030518" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032799" version="1" comment="kernel-um is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032800" version="1" comment="um-host-install-initrd is &lt;1.0-48.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032801" version="1" comment="um-host-kernel is &lt;2.6.5-7.155.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030520" version="1" comment="telnet is &lt;1.1-38.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032802" version="1" comment="heimdal-devel-32bit is &lt;9-200504071809" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032803" version="1" comment="heimdal-devel-32bit is &lt;9-200504072000" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032804" version="1" comment="heimdal-devel-64bit is &lt;9-200504071906" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030521" version="1" comment="heimdal-devel is &lt;0.6.1rc3-55.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032805" version="1" comment="heimdal-lib-32bit is &lt;9-200504071809" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032806" version="1" comment="heimdal-lib-32bit is &lt;9-200504072000" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032807" version="1" comment="heimdal-lib-64bit is &lt;9-200504071906" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032808" version="1" comment="heimdal-lib-x86 is &lt;9-200504071757" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030522" version="1" comment="heimdal-lib is &lt;0.6.1rc3-55.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030523" version="1" comment="heimdal is &lt;0.6.1rc3-55.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030524" version="1" comment="telnet is &lt;1.1-38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032809" version="1" comment="XFree86-libs-32bit is &lt;9-200504020902" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032810" version="1" comment="XFree86-libs-32bit is &lt;9-200504020922" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032811" version="1" comment="XFree86-libs-64bit is &lt;9-200504020324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032812" version="1" comment="XFree86-libs-x86 is &lt;9-200504021401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030525" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032813" version="1" comment="squid is &lt;2.5.STABLE5-42.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030526" version="1" comment="libexif is &lt;0.5.12-118.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032814" version="1" comment="squid is &lt;2.5.STABLE5-42.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030529" version="1" comment="java2-jre is &lt;1.4.2-129.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030530" version="1" comment="java2 is &lt;1.4.2-129.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030615" version="1" comment="kernel-default is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032815" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032816" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032817" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030616" version="1" comment="kernel-smp is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030617" version="1" comment="kernel-source is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030618" version="1" comment="kernel-syms is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032818" version="1" comment="horde is &lt;2.2.5-63.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030552" version="1" comment="kernel-default is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030553" version="1" comment="kernel-smp is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030554" version="1" comment="kernel-source is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030555" version="1" comment="kernel-syms is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032819" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032820" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032821" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030556" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032822" version="1" comment="kernel-debug is &lt;2.6.5-7.202.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032823" version="1" comment="kernel-um is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032824" version="1" comment="um-host-install-initrd is &lt;1.0-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032825" version="1" comment="um-host-kernel is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032826" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032827" version="1" comment="kernel-debug is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032828" version="1" comment="kernel-sn2 is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032829" version="1" comment="kernel-s390x is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032830" version="1" comment="kernel-s390 is &lt;2.6.5-7.202.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032831" version="1" comment="kdelibs3-32bit is &lt;9-200504222104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032832" version="1" comment="kdelibs3-32bit is &lt;9-200504222208" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032833" version="1" comment="kdelibs3-64bit is &lt;9-200504222125" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032834" version="1" comment="kdelibs3-x86 is &lt;9-200504222050" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030557" version="1" comment="kdelibs3 is &lt;3.2.1-44.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030558" version="1" comment="cpio is &lt;2.5-324.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032835" version="1" comment="perl-Net-Server is &lt;0.87-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030559" version="1" comment="qpopper is &lt;4.0.5-175.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032836" version="1" comment="bzip2-32bit is &lt;9-200506050833" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032837" version="1" comment="bzip2-32bit is &lt;9-200506051044" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032838" version="1" comment="bzip2-64bit is &lt;9-200506050508" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032839" version="1" comment="bzip2-x86 is &lt;9-200506051012" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030561" version="1" comment="bzip2 is &lt;1.0.2-346.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032840" version="1" comment="apache2-devel is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032841" version="1" comment="apache2-doc is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032842" version="1" comment="apache2-example-pages is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032843" version="1" comment="apache2-prefork is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032844" version="1" comment="apache2-worker is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032845" version="1" comment="apache2 is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030563" version="1" comment="libapr0 is &lt;2.0.49-27.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030564" version="1" comment="tcpdump is &lt;3.8.1-49.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032846" version="1" comment="perl-Convert-UUlib is &lt;1.0-25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030565" version="1" comment="libredcarpet-python is &lt;2.4.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030566" version="1" comment="libredcarpet-tools is &lt;2.4.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030567" version="1" comment="libredcarpet is &lt;2.4.8-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030570" version="1" comment="libsoup-devel is &lt;2.2.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030571" version="1" comment="libsoup is &lt;2.2.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030572" version="1" comment="rcd-devel is &lt;2.4.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030573" version="1" comment="rcd-modules-devel is &lt;2.4.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030574" version="1" comment="rcd-modules is &lt;2.4.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030575" version="1" comment="rcd is &lt;2.4.8-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030576" version="1" comment="red-carpet is &lt;2.4.4-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030577" version="1" comment="rug is &lt;2.4.8-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030578" version="1" comment="gnutls-devel is &lt;1.0.8-26.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030579" version="1" comment="gnutls is &lt;1.0.8-26.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032847" version="1" comment="freeradius is &lt;0.9.3-106.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032848" version="1" comment="libtiff-32bit is &lt;9-200505110332" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032849" version="1" comment="libtiff-32bit is &lt;9-200505110425" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032850" version="1" comment="libtiff-64bit is &lt;9-200505110156" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032851" version="1" comment="libtiff-x86 is &lt;9-200505110526" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030580" version="1" comment="libtiff is &lt;3.6.1-38.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030581" version="1" comment="acroread is &lt;7.0.0-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032852" version="1" comment="curl-32bit is &lt;9-200507121454" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032853" version="1" comment="glibc-locale-32bit is &lt;9-200507121454" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032854" version="1" comment="atk-32bit is &lt;9-200507121454" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032855" version="1" comment="atk-doc is &lt;1.4.1-128.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032856" version="1" comment="atk is &lt;1.4.1-128.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032857" version="1" comment="glib2-32bit is &lt;9-200507121454" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032858" version="1" comment="glib2 is &lt;2.2.3-117.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032859" version="1" comment="gtk2-32bit is &lt;9-200507121454" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032860" version="1" comment="gtk2 is &lt;2.2.4-125.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032861" version="1" comment="pango-32bit is &lt;9-200507121454" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032862" version="1" comment="pango is &lt;1.2.5-174.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032863" version="1" comment="gedit is &lt;2.4.1-52.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030619" version="1" comment="kernel-default is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032864" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032865" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032866" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030620" version="1" comment="kernel-smp is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030621" version="1" comment="kernel-source is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030622" version="1" comment="kernel-syms is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032867" version="1" comment="kernel-s390x is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032868" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032869" version="1" comment="kernel-debug is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032870" version="1" comment="kernel-sn2 is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032871" version="1" comment="kernel-s390 is &lt;2.6.5-7.193" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030623" version="1" comment="dhcpcd is &lt;1.3.22pl4-193.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032872" version="1" comment="zlib-32bit is &lt;9-200507230921" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032873" version="1" comment="zlib-32bit is &lt;9-200507231356" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032874" version="1" comment="zlib-64bit is &lt;9-200507230446" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032875" version="1" comment="zlib-devel-32bit is &lt;9-200507230921" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032876" version="1" comment="zlib-devel-32bit is &lt;9-200507231356" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032877" version="1" comment="zlib-devel-64bit is &lt;9-200507230446" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030624" version="1" comment="zlib-devel is &lt;1.2.1-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032878" version="1" comment="zlib-x86 is &lt;9-200507231603" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030625" version="1" comment="zlib is &lt;1.2.1-70.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032879" version="1" comment="kdelibs3-32bit is &lt;9-200507230921" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032880" version="1" comment="kdelibs3-32bit is &lt;9-200507231356" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032881" version="1" comment="kdelibs3-64bit is &lt;9-200507230446" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030628" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032882" version="1" comment="kdelibs3-x86 is &lt;9-200507231603" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030629" version="1" comment="kdelibs3 is &lt;3.2.1-44.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030630" version="1" comment="ruby is &lt;1.8.1-42.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030631" version="1" comment="sudo is &lt;1.6.7p5-117.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030632" version="1" comment="heimdal is &lt;0.6.1rc3-55.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032883" version="1" comment="openldap2-client-32bit is &lt;9-200508260256" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032884" version="1" comment="openldap2-client-32bit is &lt;9-200508260820" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032885" version="1" comment="openldap2-client-64bit is &lt;9-200508252329" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032886" version="1" comment="openldap2-client-x86 is &lt;9-200508261518" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030633" version="1" comment="openldap2-client is &lt;2.2.24-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032887" version="1" comment="openldap2-devel-32bit is &lt;9-200508260256" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032888" version="1" comment="openldap2-devel-32bit is &lt;9-200508260820" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032889" version="1" comment="openldap2-devel-64bit is &lt;9-200508252329" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030634" version="1" comment="openldap2-devel is &lt;2.2.24-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032890" version="1" comment="pam_ldap-32bit is &lt;9-200508260256" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032891" version="1" comment="pam_ldap-32bit is &lt;9-200508260820" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032892" version="1" comment="pam_ldap-64bit is &lt;9-200508252329" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032893" version="1" comment="pam_ldap-x86 is &lt;9-200508261518" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030635" version="1" comment="pam_ldap is &lt;169-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032894" version="1" comment="apache is &lt;1.3.29-71.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032895" version="1" comment="mod_ssl is &lt;2.8.16-71.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032896" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032897" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032898" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032899" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030636" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032900" version="1" comment="zlib-32bit is &lt;9-200507042222" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032901" version="1" comment="zlib-32bit is &lt;9-200507042327" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032902" version="1" comment="zlib-64bit is &lt;9-200507042200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032903" version="1" comment="zlib-devel-32bit is &lt;9-200507042222" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032904" version="1" comment="zlib-devel-32bit is &lt;9-200507042327" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032905" version="1" comment="zlib-devel-64bit is &lt;9-200507042200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030637" version="1" comment="zlib-devel is &lt;1.2.1-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032906" version="1" comment="zlib-x86 is &lt;9-200507042203" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030638" version="1" comment="zlib is &lt;1.2.1-70.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030639" version="1" comment="perl-Compress-Zlib is &lt;1.33-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030640" version="1" comment="net-snmp is &lt;5.1-80.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032907" version="1" comment="heartbeat-ldirectord is &lt;1.2.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032908" version="1" comment="heartbeat-pils is &lt;1.2.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032909" version="1" comment="heartbeat-stonith is &lt;1.2.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032910" version="1" comment="heartbeat is &lt;1.2.5-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030641" version="1" comment="fetchmail is &lt;6.2.5-49.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030642" version="1" comment="ruby is &lt;1.8.1-42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032911" version="1" comment="ethereal is &lt;0.10.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032912" version="1" comment="kernel-s390x is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032913" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032914" version="1" comment="kernel-debug is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032915" version="1" comment="kernel-sn2 is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032916" version="1" comment="kernel-s390 is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030643" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032917" version="1" comment="kernel-um is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032918" version="1" comment="um-host-install-initrd is &lt;1.0-48.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032919" version="1" comment="um-host-kernel is &lt;2.6.5-7.201" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030644" version="1" comment="acroread is &lt;7.0.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030645" version="1" comment="libnetpbm is &lt;1.0.0-618.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030646" version="1" comment="netpbm is &lt;10.11.4-172.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032920" version="1" comment="python-32bit is &lt;9-200712110029" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030647" version="1" comment="python-32bit is &lt;9-200712110030" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032921" version="1" comment="python-64bit is &lt;9-200712110033" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030648" version="1" comment="python-curses is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030649" version="1" comment="python-demo is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030650" version="1" comment="python-devel is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030651" version="1" comment="python-doc-pdf is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030652" version="1" comment="python-doc is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030653" version="1" comment="python-gdbm is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030654" version="1" comment="python-idle is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030655" version="1" comment="python-mpz is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030656" version="1" comment="python-tk is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032922" version="1" comment="python-x86 is &lt;9-200712110030" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030657" version="1" comment="python-xml is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030658" version="1" comment="python is &lt;2.3.3-88.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032923" version="1" comment="pcre-32bit is &lt;9-200508260256" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032924" version="1" comment="pcre-32bit is &lt;9-200508260820" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032925" version="1" comment="pcre-64bit is &lt;9-200508252329" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030659" version="1" comment="pcre-devel is &lt;4.4-109.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032926" version="1" comment="pcre-x86 is &lt;9-200508261518" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030660" version="1" comment="pcre is &lt;4.4-109.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032927" version="1" comment="apache2-devel is &lt;2.0.49-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032928" version="1" comment="apache2-prefork is &lt;2.0.49-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032929" version="1" comment="apache2-worker is &lt;2.0.49-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032930" version="1" comment="apache2 is &lt;2.0.49-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030661" version="1" comment="libapr0 is &lt;2.0.49-27.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030662" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030663" version="1" comment="XFree86-server is &lt;4.3.99.902-43.50.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030667" version="1" comment="mysql-Max is &lt;4.0.18-32.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030668" version="1" comment="mysql-devel is &lt;4.0.18-32.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030669" version="1" comment="mysql is &lt;4.0.18-32.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032931" version="1" comment="apache2-prefork is &lt;2.0.49-27.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032932" version="1" comment="apache2-worker is &lt;2.0.49-27.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032933" version="1" comment="apache2 is &lt;2.0.49-27.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032934" version="1" comment="mozilla-calendar is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030672" version="1" comment="mozilla-cs is &lt;1.7.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030673" version="1" comment="mozilla-deat is &lt;1.7.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030674" version="1" comment="mozilla-devel is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030675" version="1" comment="mozilla-dom-inspector is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030676" version="1" comment="mozilla-hu is &lt;1.78-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030677" version="1" comment="mozilla-irc is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030678" version="1" comment="mozilla-ja is &lt;1.7.7-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030679" version="1" comment="mozilla-ko is &lt;1.75-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030681" version="1" comment="mozilla-mail is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030682" version="1" comment="mozilla-venkman is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030683" version="1" comment="mozilla is &lt;1.7.8-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032935" version="1" comment="squid is &lt;2.5.STABLE5-42.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030685" version="1" comment="openssh-askpass is &lt;4.1p1-11.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030686" version="1" comment="openssh is &lt;4.1p1-11.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030689" version="1" comment="util-linux is &lt;2.12-72.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032936" version="1" comment="squid is &lt;2.5.STABLE5-42.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032937" version="1" comment="imap-devel is &lt;2002e-92.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032938" version="1" comment="imap-lib is &lt;2002e-92.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032939" version="1" comment="arc is &lt;5.21e-653.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030691" version="1" comment="libgda-devel is &lt;1.0.3-54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030692" version="1" comment="libgda is &lt;1.0.3-54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032940" version="1" comment="openssl-32bit is &lt;9-200510141947" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032941" version="1" comment="openssl-32bit is &lt;9-200510171254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032942" version="1" comment="openssl-64bit is &lt;9-200510151954" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032943" version="1" comment="openssl-devel-32bit is &lt;9-200510141947" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032944" version="1" comment="openssl-devel-32bit is &lt;9-200510171254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032945" version="1" comment="openssl-devel-64bit is &lt;9-200510151954" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030694" version="1" comment="openssl-devel is &lt;0.9.7d-15.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032946" version="1" comment="openssl-x86 is &lt;9-200510151354" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030695" version="1" comment="openssl is &lt;0.9.7d-15.15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032947" version="1" comment="apache2-worker is &lt;2.0.49-27.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032948" version="1" comment="libungif-32bit is &lt;9-200511021858" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032949" version="1" comment="libungif-32bit is &lt;9-200511022315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032950" version="1" comment="libungif-64bit is &lt;9-200511021922" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032951" version="1" comment="libungif-x86 is &lt;9-200511021845" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030696" version="1" comment="libungif is &lt;4.1.0b1-585.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030697" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032952" version="1" comment="gdk-pixbuf-x86 is &lt;9-200511021845" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030698" version="1" comment="gdk-pixbuf is &lt;0.22.0-62.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032953" version="1" comment="gtk2-32bit is &lt;9-200511021858" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032954" version="1" comment="gtk2-32bit is &lt;9-200511022315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032955" version="1" comment="gtk2-64bit is &lt;9-200511021922" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032956" version="1" comment="gtk2-devel is &lt;2.2.4-125.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032957" version="1" comment="gtk2-x86 is &lt;9-200511021845" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032958" version="1" comment="gtk2 is &lt;2.2.4-125.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030702" version="1" comment="netpbm is &lt;10.11.4-172.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030703" version="1" comment="texinfo is &lt;4.6-61.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030704" version="1" comment="liby2util-devel is &lt;2.9.27-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030705" version="1" comment="liby2util is &lt;2.9.27-0.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032959" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032960" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032961" version="1" comment="mod_php4-core is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032962" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032963" version="1" comment="php4-devel is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032964" version="1" comment="php4-exif is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032965" version="1" comment="php4-fastcgi is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032966" version="1" comment="php4-imap is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032967" version="1" comment="php4-mysql is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032968" version="1" comment="php4-pear is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032969" version="1" comment="php4-session is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032970" version="1" comment="php4-sysvshm is &lt;4.3.4-43.46.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032971" version="1" comment="ethereal is &lt;0.10.13-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032972" version="1" comment="curl-32bit is &lt;9-200511021858" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032973" version="1" comment="curl-32bit is &lt;9-200511022315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030706" version="1" comment="curl-devel is &lt;7.11.0-39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030707" version="1" comment="curl is &lt;7.11.0-39.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032974" version="1" comment="curl-32bit is &lt;9-200510171247" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030708" version="1" comment="cups is &lt;1.1.20-108.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032975" version="1" comment="clamav is &lt;0.87.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030709" version="1" comment="snort is &lt;2.3.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030710" version="1" comment="mozilla-mail is &lt;1.7.8-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032976" version="1" comment="ethereal is &lt;0.10.13-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032977" version="1" comment="apache2-prefork is &lt;2.0.49-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032978" version="1" comment="apache2-worker is &lt;2.0.49-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032979" version="1" comment="apache2 is &lt;2.0.49-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032980" version="1" comment="apache-devel is &lt;1.3.29-71.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032981" version="1" comment="apache is &lt;1.3.29-71.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032982" version="1" comment="mod_ssl is &lt;2.8.16-71.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032983" version="1" comment="apache2-prefork is &lt;2.0.49-27.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032984" version="1" comment="apache2-worker is &lt;2.0.49-27.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032985" version="1" comment="apache2 is &lt;2.0.49-27.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032986" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032987" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032988" version="1" comment="mod_php4-core is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032989" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032990" version="1" comment="php4-devel is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032991" version="1" comment="php4-exif is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032992" version="1" comment="php4-fastcgi is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032993" version="1" comment="php4-imap is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032994" version="1" comment="php4-mbstring is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032995" version="1" comment="php4-mysql is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032996" version="1" comment="php4-pear is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032997" version="1" comment="php4-recode is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032998" version="1" comment="php4-session is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032999" version="1" comment="php4-sysvshm is &lt;4.3.4-43.46.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033000" version="1" comment="kernel-s390x is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030714" version="1" comment="kernel-source is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030715" version="1" comment="kernel-syms is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030711" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033001" version="1" comment="kernel-debug is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030712" version="1" comment="kernel-default is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030713" version="1" comment="kernel-smp is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033002" version="1" comment="kernel-um is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033003" version="1" comment="um-host-install-initrd is &lt;1.0-48.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033004" version="1" comment="um-host-kernel is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033005" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033006" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033007" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033008" version="1" comment="kernel-s390 is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033009" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033010" version="1" comment="kernel-sn2 is &lt;2.6.5-7.252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033011" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033012" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033013" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033014" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030716" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033015" version="1" comment="horde is &lt;2.2.5-63.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030717" version="1" comment="libnetpbm is &lt;1.0.0-618.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030718" version="1" comment="netpbm is &lt;10.11.4-172.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030719" version="1" comment="netpbm is &lt;10.11.4-172.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033016" version="1" comment="ethereal is &lt;0.10.13-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030720" version="1" comment="freeswan is &lt;2.04_1.5.4-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030721" version="1" comment="ipsec-tools is &lt;0.3.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030722" version="1" comment="java2-jre is &lt;1.4.2-129.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030723" version="1" comment="java2 is &lt;1.4.2-129.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033017" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033018" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030724" version="1" comment="perl-32bit is &lt;9-200512171950" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033019" version="1" comment="perl-32bit is &lt;9-200512180809" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033020" version="1" comment="perl-64bit is &lt;9-200512180127" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033021" version="1" comment="perl-x86 is &lt;9-200512180003" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030725" version="1" comment="perl is &lt;5.8.3-32.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033022" version="1" comment="horde is &lt;2.2.5-63.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030726" version="1" comment="fetchmail is &lt;6.2.5-49.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030729" version="1" comment="kdelibs3-32bit is &lt;9-200601130434" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033023" version="1" comment="kdelibs3-32bit is &lt;9-200601140751" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033024" version="1" comment="kdelibs3-64bit is &lt;9-200601140916" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030730" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033025" version="1" comment="kdelibs3-x86 is &lt;9-200601130505" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030731" version="1" comment="kdelibs3 is &lt;3.2.1-44.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030733" version="1" comment="gpg is &lt;1.2.4-68.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030734" version="1" comment="mailman is &lt;2.1.4-83.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033026" version="1" comment="sendmail is &lt;8.12.11-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033027" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033028" version="1" comment="kernel-debug is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030735" version="1" comment="kernel-default is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033029" version="1" comment="kernel-sn2 is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030737" version="1" comment="kernel-source is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030738" version="1" comment="kernel-syms is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033030" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033031" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033032" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030736" version="1" comment="kernel-smp is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033033" version="1" comment="kernel-s390 is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033034" version="1" comment="kernel-s390x is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030739" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033035" version="1" comment="kernel-um is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033036" version="1" comment="um-host-install-initrd is &lt;1.0-48.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033037" version="1" comment="um-host-kernel is &lt;2.6.5-7.257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033038" version="1" comment="authldap is &lt;1.6.0-882.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033039" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033040" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033041" version="1" comment="mod_php4-core is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033042" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033043" version="1" comment="php4-devel is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033044" version="1" comment="php4-exif is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033045" version="1" comment="php4-fastcgi is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033046" version="1" comment="php4-imap is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033047" version="1" comment="php4-mbstring is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033048" version="1" comment="php4-mysql is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033049" version="1" comment="php4-pear is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033050" version="1" comment="php4-recode is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033051" version="1" comment="php4-session is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033052" version="1" comment="php4-sysvshm is &lt;4.3.4-43.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030740" version="1" comment="openssh-askpass is &lt;4.1p1-11.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030741" version="1" comment="openssh is &lt;4.1p1-11.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030742" version="1" comment="gpg is &lt;1.2.4-68.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030744" version="1" comment="heimdal-devel-32bit is &lt;9-200602210430" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033053" version="1" comment="heimdal-devel-32bit is &lt;9-200602210946" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033054" version="1" comment="heimdal-devel-64bit is &lt;9-200602210547" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030745" version="1" comment="heimdal-devel is &lt;0.6.1rc3-55.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030746" version="1" comment="heimdal-lib-32bit is &lt;9-200602210430" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033055" version="1" comment="heimdal-lib-32bit is &lt;9-200602210946" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033056" version="1" comment="heimdal-lib-64bit is &lt;9-200602210547" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033057" version="1" comment="heimdal-lib-x86 is &lt;9-200602210537" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030747" version="1" comment="heimdal-lib is &lt;0.6.1rc3-55.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030748" version="1" comment="heimdal is &lt;0.6.1rc3-55.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030751" version="1" comment="gnutls-devel is &lt;1.0.8-26.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030752" version="1" comment="gnutls is &lt;1.0.8-26.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030754" version="1" comment="binutils-32bit is &lt;9-200601210802" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033058" version="1" comment="binutils-32bit is &lt;9-200601220116" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033059" version="1" comment="binutils-64bit is &lt;9-200601210920" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033060" version="1" comment="binutils-x86 is &lt;9-200601210926" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030755" version="1" comment="binutils is &lt;2.15.90.0.1.1-32.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033061" version="1" comment="kernel-s390 is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030758" version="1" comment="kernel-source is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030759" version="1" comment="kernel-syms is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033062" version="1" comment="kernel-s390x is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030756" version="1" comment="kernel-default is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030757" version="1" comment="kernel-smp is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030760" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033063" version="1" comment="kernel-debug is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033064" version="1" comment="kernel-um is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033065" version="1" comment="um-host-install-initrd is &lt;1.0-48.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033066" version="1" comment="um-host-kernel is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033067" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033068" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033069" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033070" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033071" version="1" comment="kernel-sn2 is &lt;2.6.5-7.276" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030761" version="1" comment="freetype2-32bit is &lt;9-200606132344" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033072" version="1" comment="freetype2-32bit is &lt;9-200606140645" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033073" version="1" comment="freetype2-64bit is &lt;9-200606140026" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030762" version="1" comment="freetype2-devel-32bit is &lt;9-200606132344" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033074" version="1" comment="freetype2-devel-32bit is &lt;9-200606140645" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033075" version="1" comment="freetype2-devel-64bit is &lt;9-200606140026" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030763" version="1" comment="freetype2-devel is &lt;2.1.7-53.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033076" version="1" comment="freetype2-x86 is &lt;9-200606140312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030764" version="1" comment="freetype2 is &lt;2.1.7-53.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033077" version="1" comment="mozilla-calendar is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030767" version="1" comment="mozilla-cs is &lt;1.7.5-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030768" version="1" comment="mozilla-deat is &lt;1.7.6-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030769" version="1" comment="mozilla-devel is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030770" version="1" comment="mozilla-dom-inspector is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030771" version="1" comment="mozilla-hu is &lt;1.78-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030772" version="1" comment="mozilla-irc is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030773" version="1" comment="mozilla-ja is &lt;1.7.7-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030774" version="1" comment="mozilla-ko is &lt;1.75-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030776" version="1" comment="mozilla-mail is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030777" version="1" comment="mozilla-venkman is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030778" version="1" comment="mozilla is &lt;1.7.8-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030779" version="1" comment="liby2util-devel is &lt;2.9.27-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030780" version="1" comment="liby2util is &lt;2.9.27-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030781" version="1" comment="zoo is &lt;2.10-851.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033078" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033079" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033080" version="1" comment="mod_php4-core is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033081" version="1" comment="php4-devel is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033082" version="1" comment="php4-exif is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033083" version="1" comment="php4-fastcgi is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033084" version="1" comment="php4-imap is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033085" version="1" comment="php4-mbstring is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033086" version="1" comment="php4-mysql is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033087" version="1" comment="php4-pear is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033088" version="1" comment="php4-recode is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033089" version="1" comment="php4-session is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033090" version="1" comment="php4-sysvshm is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033091" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033092" version="1" comment="ncompress is &lt;4.2.4-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033093" version="1" comment="sendmail is &lt;8.12.11-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033094" version="1" comment="horde is &lt;2.2.5-63.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030782" version="1" comment="zoo is &lt;2.10-851.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033095" version="1" comment="freeradius is &lt;1.0.5-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030783" version="1" comment="mysql is &lt;4.0.18-32.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030784" version="1" comment="mysql-Max is &lt;4.0.18-32.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033096" version="1" comment="clamav is &lt;0.88.1-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030786" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.18-33.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030787" version="1" comment="XFree86-server is &lt;4.3.99.902-43.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030788" version="1" comment="ruby is &lt;1.8.1-42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033097" version="1" comment="ethereal is &lt;0.10.13-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033098" version="1" comment="clamav is &lt;0.88.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033099" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033100" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033101" version="1" comment="mod_php4-core is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033102" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033103" version="1" comment="php4-devel is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033104" version="1" comment="php4-exif is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033105" version="1" comment="php4-fastcgi is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033106" version="1" comment="php4-gd is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033107" version="1" comment="php4-imap is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033108" version="1" comment="php4-mbstring is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033109" version="1" comment="php4-mysql is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033110" version="1" comment="php4-pear is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033111" version="1" comment="php4-recode is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033112" version="1" comment="php4-session is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033113" version="1" comment="php4-sysvshm is &lt;4.3.4-43.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030789" version="1" comment="libtiff-32bit is &lt;9-200604240415" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033114" version="1" comment="libtiff-32bit is &lt;9-200604240730" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033115" version="1" comment="libtiff-64bit is &lt;9-200604240704" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033116" version="1" comment="libtiff-x86 is &lt;9-200604240512" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030790" version="1" comment="libtiff is &lt;3.6.1-38.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033117" version="1" comment="nagios-www is &lt;1.2-73.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030791" version="1" comment="mailman is &lt;2.1.4-83.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033118" version="1" comment="quagga is &lt;0.96.4-31.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030821" version="1" comment="postgresql-contrib is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030822" version="1" comment="postgresql-devel is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030823" version="1" comment="postgresql-docs is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030824" version="1" comment="postgresql-libs-32bit is &lt;9-200605291910" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033119" version="1" comment="postgresql-libs-32bit is &lt;9-200605292202" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033120" version="1" comment="postgresql-libs-64bit is &lt;9-200605291954" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033121" version="1" comment="postgresql-libs-x86 is &lt;9-200605291842" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030825" version="1" comment="postgresql-libs is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030826" version="1" comment="postgresql-pl is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030827" version="1" comment="postgresql-server is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030828" version="1" comment="postgresql is &lt;7.4.13-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030829" version="1" comment="binutils-32bit is &lt;9-200610302219" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033122" version="1" comment="binutils-32bit is &lt;9-200610310204" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033123" version="1" comment="binutils-64bit is &lt;9-200610302306" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033124" version="1" comment="binutils-x86 is &lt;9-200610302220" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030830" version="1" comment="binutils is &lt;2.15.90.0.1.1-32.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030831" version="1" comment="perl-spamassassin is &lt;2.64-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033125" version="1" comment="kdebase3-kdm is &lt;3.2.1-68.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033126" version="1" comment="gdm is &lt;2.4.4.7-35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033127" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033128" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033129" version="1" comment="mod_php4-core is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033130" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033131" version="1" comment="php4-curl is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033132" version="1" comment="php4-devel is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033133" version="1" comment="php4-exif is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033134" version="1" comment="php4-fastcgi is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033135" version="1" comment="php4-gd is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033136" version="1" comment="php4-imap is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033137" version="1" comment="php4-mbstring is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033138" version="1" comment="php4-mysql is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033139" version="1" comment="php4-pear is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033140" version="1" comment="php4-pgsql is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033141" version="1" comment="php4-recode is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033142" version="1" comment="php4-session is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033143" version="1" comment="php4-sysvshm is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033144" version="1" comment="php4-wddx is &lt;4.3.4-43.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030835" version="1" comment="cron is &lt;3.0.1-920.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030836" version="1" comment="tiff is &lt;3.6.1-38.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033145" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033146" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033147" version="1" comment="mod_php4-core is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033148" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033149" version="1" comment="php4-devel is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033150" version="1" comment="php4-exif is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033151" version="1" comment="php4-fastcgi is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033152" version="1" comment="php4-gd is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033153" version="1" comment="php4-imap is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033154" version="1" comment="php4-mbstring is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033155" version="1" comment="php4-mysql is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033156" version="1" comment="php4-pear is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033157" version="1" comment="php4-recode is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033158" version="1" comment="php4-session is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033159" version="1" comment="php4-sysvshm is &lt;4.3.4-43.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030837" version="1" comment="snort is &lt;2.3.2-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033160" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030842" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030843" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030844" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030845" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030846" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030847" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030849" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030850" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030851" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033161" version="1" comment="arts-32bit is &lt;9-200606211802" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030852" version="1" comment="arts-32bit is &lt;9-200606211826" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033162" version="1" comment="arts-64bit is &lt;9-200606211820" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033163" version="1" comment="arts-x86 is &lt;9-200606211846" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030853" version="1" comment="arts is &lt;1.2.1-35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033164" version="1" comment="kernel-s390 is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030856" version="1" comment="kernel-source is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030857" version="1" comment="kernel-syms is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033165" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033166" version="1" comment="kernel-debug is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030854" version="1" comment="kernel-default is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033167" version="1" comment="kernel-sn2 is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030855" version="1" comment="kernel-smp is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030858" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033168" version="1" comment="kernel-um is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033169" version="1" comment="um-host-install-initrd is &lt;1.0-48.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033170" version="1" comment="um-host-kernel is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033171" version="1" comment="kernel-s390x is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033172" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033173" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033174" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.286" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030859" version="1" comment="openssl-32bit is &lt;9-200609270654" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033175" version="1" comment="openssl-32bit is &lt;9-200609270843" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033176" version="1" comment="openssl-64bit is &lt;9-200609270842" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030860" version="1" comment="openssl-devel-32bit is &lt;9-200609270654" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033177" version="1" comment="openssl-devel-32bit is &lt;9-200609270843" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033178" version="1" comment="openssl-devel-64bit is &lt;9-200609270842" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030861" version="1" comment="openssl-devel is &lt;0.9.7d-15.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033179" version="1" comment="openssl-x86 is &lt;9-200609271104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030862" version="1" comment="openssl is &lt;0.9.7d-15.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030863" version="1" comment="openssl-32bit is &lt;9-200610132325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033180" version="1" comment="openssl-32bit is &lt;9-200610141314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033181" version="1" comment="openssl-64bit is &lt;9-200610151241" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030864" version="1" comment="openssl-devel-32bit is &lt;9-200610132325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033182" version="1" comment="openssl-devel-32bit is &lt;9-200610141314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033183" version="1" comment="openssl-devel-64bit is &lt;9-200610151241" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030865" version="1" comment="openssl-devel is &lt;0.9.7d-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033184" version="1" comment="openssl-x86 is &lt;9-200610140253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030866" version="1" comment="openssl is &lt;0.9.7d-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030867" version="1" comment="gpg is &lt;1.2.4-68.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030873" version="1" comment="mutt is &lt;1.5.6i-64.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033185" version="1" comment="libpng-32bit is &lt;9-200612010114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030875" version="1" comment="libpng-32bit is &lt;9-200612010115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033186" version="1" comment="libpng-64bit is &lt;9-200612010055" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030876" version="1" comment="libpng-devel is &lt;1.2.5-182.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033187" version="1" comment="libpng-x86 is &lt;9-200612010114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030877" version="1" comment="libpng is &lt;1.2.5-182.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030879" version="1" comment="samba is &lt;3.0.20b-3.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030881" version="1" comment="libtiff-32bit is &lt;9-200607271200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033188" version="1" comment="libtiff-32bit is &lt;9-200607272039" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033189" version="1" comment="libtiff-64bit is &lt;9-200607270723" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033190" version="1" comment="libtiff-x86 is &lt;9-200607271336" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030882" version="1" comment="libtiff is &lt;3.6.1-38.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030883" version="1" comment="freetype2-32bit is &lt;9-200607282027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033191" version="1" comment="freetype2-32bit is &lt;9-200607300148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033192" version="1" comment="freetype2-64bit is &lt;9-200607282053" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030884" version="1" comment="freetype2-devel-32bit is &lt;9-200607282027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033193" version="1" comment="freetype2-devel-32bit is &lt;9-200607300148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033194" version="1" comment="freetype2-devel-64bit is &lt;9-200607282053" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030885" version="1" comment="freetype2-devel is &lt;2.1.7-53.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033195" version="1" comment="freetype2-x86 is &lt;9-200607282200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030886" version="1" comment="freetype2 is &lt;2.1.7-53.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033196" version="1" comment="kernel-s390x is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030889" version="1" comment="kernel-source is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030890" version="1" comment="kernel-syms is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030887" version="1" comment="kernel-default is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030888" version="1" comment="kernel-smp is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033197" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033198" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033199" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033200" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033201" version="1" comment="kernel-debug is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033202" version="1" comment="kernel-sn2 is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033203" version="1" comment="kernel-s390 is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030891" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033204" version="1" comment="kernel-um is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033205" version="1" comment="um-host-install-initrd is &lt;1.0-48.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033206" version="1" comment="um-host-kernel is &lt;2.6.5-7.282" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033207" version="1" comment="horde is &lt;2.2.5-63.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033208" version="1" comment="ethereal is &lt;0.10.13-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030892" version="1" comment="ruby is &lt;1.8.1-42.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030893" version="1" comment="XFree86-server is &lt;4.3.99.902-43.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033209" version="1" comment="kernel-s390 is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030896" version="1" comment="kernel-source is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030897" version="1" comment="kernel-syms is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030898" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033210" version="1" comment="kernel-debug is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030894" version="1" comment="kernel-default is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030895" version="1" comment="kernel-smp is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033211" version="1" comment="kernel-um is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033212" version="1" comment="um-host-install-initrd is &lt;1.0-48.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033213" version="1" comment="um-host-kernel is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033214" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033215" version="1" comment="kernel-sn2 is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033216" version="1" comment="kernel-s390x is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033217" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033218" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033219" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.283" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030902" version="1" comment="gpg is &lt;1.2.4-68.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033220" version="1" comment="apache is &lt;1.3.29-71.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033221" version="1" comment="mod_ssl is &lt;2.8.16-71.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030903" version="1" comment="apache-devel is &lt;1.3.29-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033222" version="1" comment="apache-doc is &lt;1.3.29-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033223" version="1" comment="apache-example-pages is &lt;1.3.29-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030904" version="1" comment="apache is &lt;1.3.29-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033224" version="1" comment="mod_ssl is &lt;2.8.16-71.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030905" version="1" comment="mysql-Max is &lt;4.0.18-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030906" version="1" comment="mysql is &lt;4.0.18-32.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033225" version="1" comment="clamav is &lt;0.88.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030910" version="1" comment="man is &lt;2.4.1-214.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033226" version="1" comment="ethereal is &lt;0.10.13-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030913" version="1" comment="gzip is &lt;1.3.5-136.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030914" version="1" comment="bind-utils-32bit is &lt;9-200611140525" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033227" version="1" comment="bind-utils-32bit is &lt;9-200611142157" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033228" version="1" comment="bind-utils-64bit is &lt;9-200611140852" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033229" version="1" comment="bind-utils-x86 is &lt;9-200611140553" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030915" version="1" comment="bind-utils is &lt;9.2.3-76.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030916" version="1" comment="bind is &lt;9.2.3-76.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030917" version="1" comment="openssl-32bit is &lt;9-200609140529" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033230" version="1" comment="openssl-32bit is &lt;9-200609142242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033231" version="1" comment="openssl-64bit is &lt;9-200609140736" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030918" version="1" comment="openssl-devel-32bit is &lt;9-200609140529" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033232" version="1" comment="openssl-devel-32bit is &lt;9-200609142242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033233" version="1" comment="openssl-devel-64bit is &lt;9-200609140736" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030919" version="1" comment="openssl-devel is &lt;0.9.7d-15.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033234" version="1" comment="openssl-x86 is &lt;9-200609141208" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030920" version="1" comment="openssl is &lt;0.9.7d-15.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033235" version="1" comment="sendmail is &lt;8.12.11-2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030921" version="1" comment="perl-Tk is &lt;800.024-429.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033236" version="1" comment="libgsf is &lt;1.8.2-164.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030926" version="1" comment="screen is &lt;4.0.2-41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033237" version="1" comment="ethereal is &lt;0.10.13-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030927" version="1" comment="openldap2 is &lt;2.2.24-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033238" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033239" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033240" version="1" comment="mod_php4-core is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033241" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033242" version="1" comment="php4-curl is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033243" version="1" comment="php4-devel is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033244" version="1" comment="php4-exif is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033245" version="1" comment="php4-fastcgi is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033246" version="1" comment="php4-gd is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033247" version="1" comment="php4-imap is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033248" version="1" comment="php4-mbstring is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033249" version="1" comment="php4-mysql is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033250" version="1" comment="php4-pear is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033251" version="1" comment="php4-pgsql is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033252" version="1" comment="php4-recode is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033253" version="1" comment="php4-session is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033254" version="1" comment="php4-sysvshm is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033255" version="1" comment="php4-wddx is &lt;4.3.4-43.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030928" version="1" comment="gnutls-devel is &lt;1.0.8-26.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030929" version="1" comment="gnutls is &lt;1.0.8-26.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033256" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033257" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030932" version="1" comment="texinfo is &lt;4.6-61.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030933" version="1" comment="qt3-32bit is &lt;9-200610230741" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033258" version="1" comment="qt3-32bit is &lt;9-200610231629" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033259" version="1" comment="qt3-64bit is &lt;9-200610230717" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030934" version="1" comment="qt3-devel-32bit is &lt;9-200610230741" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033260" version="1" comment="qt3-devel-32bit is &lt;9-200610231629" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033261" version="1" comment="qt3-devel-64bit is &lt;9-200610230717" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030935" version="1" comment="qt3-devel-doc is &lt;3.3.1-36.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030936" version="1" comment="qt3-devel is &lt;3.3.1-36.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030937" version="1" comment="qt3-non-mt is &lt;3.3.1-41.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033262" version="1" comment="qt3-x86 is &lt;9-200610231048" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030938" version="1" comment="qt3 is &lt;3.3.1-36.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030939" version="1" comment="openssh-askpass is &lt;4.1p1-11.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030940" version="1" comment="openssh is &lt;4.1p1-11.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030941" version="1" comment="python-32bit is &lt;9-200610132325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033263" version="1" comment="python-32bit is &lt;9-200610141314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033264" version="1" comment="python-64bit is &lt;9-200610151241" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030942" version="1" comment="python-devel is &lt;2.3.3-88.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033265" version="1" comment="python-x86 is &lt;9-200610140253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030943" version="1" comment="python is &lt;2.3.3-88.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030944" version="1" comment="pam_ldap-32bit is &lt;9-200610241503" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033266" version="1" comment="pam_ldap-32bit is &lt;9-200610241633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033267" version="1" comment="pam_ldap-64bit is &lt;9-200610241608" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033268" version="1" comment="pam_ldap-x86 is &lt;9-200610241452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030945" version="1" comment="pam_ldap is &lt;169-28.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033269" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033270" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033271" version="1" comment="mod_php4-core is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033272" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033273" version="1" comment="php4-curl is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033274" version="1" comment="php4-devel is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033275" version="1" comment="php4-exif is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033276" version="1" comment="php4-fastcgi is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033277" version="1" comment="php4-gd is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033278" version="1" comment="php4-imap is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033279" version="1" comment="php4-mbstring is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033280" version="1" comment="php4-mysql is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033281" version="1" comment="php4-pear is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033282" version="1" comment="php4-pgsql is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033283" version="1" comment="php4-recode is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033284" version="1" comment="php4-session is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033285" version="1" comment="php4-sysvshm is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033286" version="1" comment="php4-wddx is &lt;4.3.4-43.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030953" version="1" comment="ruby is &lt;1.8.1-42.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030954" version="1" comment="postgresql-contrib is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030955" version="1" comment="postgresql-devel is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030956" version="1" comment="postgresql-docs is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033287" version="1" comment="postgresql-libs-32bit is &lt;9-200611152043" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030957" version="1" comment="postgresql-libs-32bit is &lt;9-200611160118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033288" version="1" comment="postgresql-libs-64bit is &lt;9-200611151828" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033289" version="1" comment="postgresql-libs-x86 is &lt;9-200611160110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030958" version="1" comment="postgresql-libs is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030959" version="1" comment="postgresql-pl is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030960" version="1" comment="postgresql-server is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030961" version="1" comment="postgresql is &lt;7.4.13-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030962" version="1" comment="xsupplicant is &lt;1.2.8-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030964" version="1" comment="apache2-devel is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033290" version="1" comment="apache2-doc is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033291" version="1" comment="apache2-example-pages is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030965" version="1" comment="apache2-prefork is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030966" version="1" comment="apache2-worker is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030967" version="1" comment="apache2 is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030963" version="1" comment="libapr0 is &lt;2.0.59-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030968" version="1" comment="openldap2-client-32bit is &lt;9-200611171828" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033292" version="1" comment="openldap2-client-32bit is &lt;9-200611180315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033293" version="1" comment="openldap2-client-64bit is &lt;9-200611171843" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033294" version="1" comment="openldap2-client-x86 is &lt;9-200611171910" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030969" version="1" comment="openldap2-client is &lt;2.2.24-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030970" version="1" comment="openssh-askpass is &lt;4.1p1-11.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030971" version="1" comment="openssh is &lt;4.1p1-11.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033295" version="1" comment="acroread is &lt;7.0.9-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030973" version="1" comment="gv is &lt;3.5.8-1129.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009030974" version="1" comment="gv is &lt;3.5.8-1129.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033296" version="1" comment="clamav is &lt;0.88.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031004" version="1" comment="libredcarpet-python is &lt;2.4.9-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031005" version="1" comment="libredcarpet-tools is &lt;2.4.9-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031006" version="1" comment="libredcarpet is &lt;2.4.9-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031007" version="1" comment="python-openssl is &lt;0.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031008" version="1" comment="rcd-devel is &lt;2.4.9-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031009" version="1" comment="rcd-modules-devel is &lt;2.4.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031010" version="1" comment="rcd-modules is &lt;2.4.9-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031011" version="1" comment="rcd is &lt;2.4.9-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031012" version="1" comment="red-carpet is &lt;2.4.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031013" version="1" comment="rug is &lt;2.4.9-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031014" version="1" comment="xmlrpc-c-devel is &lt;0.9.10-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031015" version="1" comment="xmlrpc-c is &lt;0.9.10-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031018" version="1" comment="libsoup-devel is &lt;2.2.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031019" version="1" comment="libsoup is &lt;2.2.3-0.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031020" version="1" comment="rcd-devel is &lt;2.4.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031021" version="1" comment="rcd is &lt;2.4.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033297" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031024" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031025" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031026" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031027" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031028" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031029" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031031" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031032" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031033" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031034" version="1" comment="tar is &lt;1.13.25-325.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031035" version="1" comment="XFree86-server is &lt;4.3.99.902-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031036" version="1" comment="gpg is &lt;1.2.4-68.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031038" version="1" comment="kdegraphics3 is &lt;3.2.1-67.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031039" version="1" comment="ruby is &lt;1.8.1-42.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033298" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033299" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033300" version="1" comment="mod_php4-core is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033301" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033302" version="1" comment="php4-devel is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033303" version="1" comment="php4-exif is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033304" version="1" comment="php4-fastcgi is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033305" version="1" comment="php4-imap is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033306" version="1" comment="php4-mhash is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033307" version="1" comment="php4-mysql is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033308" version="1" comment="php4-pear is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033309" version="1" comment="php4-session is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033310" version="1" comment="php4-sysvshm is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033311" version="1" comment="php4-unixODBC is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033312" version="1" comment="php4-wddx is &lt;4.3.4-43.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033313" version="1" comment="java2-jre is &lt;1.3.1-216.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031042" version="1" comment="java2-jre is &lt;1.4.2-129.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033314" version="1" comment="java2 is &lt;1.3.1-216.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031043" version="1" comment="java2 is &lt;1.4.2-129.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033315" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033316" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031044" version="1" comment="w3m is &lt;0.4.1_m17n_20030308-201.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031045" version="1" comment="pcre-32bit is &lt;9-200711150229" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033317" version="1" comment="pcre-32bit is &lt;9-200711150230" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033318" version="1" comment="pcre-64bit is &lt;9-200711150231" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031046" version="1" comment="pcre-devel is &lt;4.4-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033319" version="1" comment="pcre-x86 is &lt;9-200711150229" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031047" version="1" comment="pcre is &lt;4.4-109.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033320" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033321" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033322" version="1" comment="mod_php4-apache2 is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031048" version="1" comment="mod_php4-core is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033323" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031049" version="1" comment="php4-bcmath is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031050" version="1" comment="php4-bz2 is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031051" version="1" comment="php4-calendar is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031052" version="1" comment="php4-ctype is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031053" version="1" comment="php4-curl is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031054" version="1" comment="php4-dba is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031055" version="1" comment="php4-dbase is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031056" version="1" comment="php4-devel is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031057" version="1" comment="php4-domxml is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031058" version="1" comment="php4-exif is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031059" version="1" comment="php4-fastcgi is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031060" version="1" comment="php4-filepro is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031061" version="1" comment="php4-ftp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031062" version="1" comment="php4-gd is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031063" version="1" comment="php4-gettext is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031064" version="1" comment="php4-gmp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031065" version="1" comment="php4-iconv is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031066" version="1" comment="php4-imap is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031067" version="1" comment="php4-ldap is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031068" version="1" comment="php4-mbstring is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031069" version="1" comment="php4-mcal is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031070" version="1" comment="php4-mcrypt is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031071" version="1" comment="php4-mhash is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031072" version="1" comment="php4-mime_magic is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031073" version="1" comment="php4-mysql is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031074" version="1" comment="php4-pear is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031075" version="1" comment="php4-pgsql is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031076" version="1" comment="php4-qtdom is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031077" version="1" comment="php4-readline is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031078" version="1" comment="php4-recode is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031080" version="1" comment="php4-session is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031081" version="1" comment="php4-shmop is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031082" version="1" comment="php4-snmp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031083" version="1" comment="php4-sockets is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031084" version="1" comment="php4-swf is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031085" version="1" comment="php4-sysvsem is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031086" version="1" comment="php4-sysvshm is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031087" version="1" comment="php4-unixODBC is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031088" version="1" comment="php4-wddx is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031089" version="1" comment="php4-xslt is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031090" version="1" comment="php4-yp is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031091" version="1" comment="php4-zlib is &lt;4.3.4-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031094" version="1" comment="apache2-devel is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033324" version="1" comment="apache2-doc is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033325" version="1" comment="apache2-example-pages is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031095" version="1" comment="apache2-prefork is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031096" version="1" comment="apache2-worker is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031097" version="1" comment="apache2 is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031093" version="1" comment="libapr0 is &lt;2.0.59-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033326" version="1" comment="pcre-32bit is &lt;9-200711270033" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031098" version="1" comment="pcre-32bit is &lt;9-200711270035" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033327" version="1" comment="pcre-64bit is &lt;9-200711270034" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031099" version="1" comment="pcre-devel is &lt;4.4-109.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033328" version="1" comment="pcre-x86 is &lt;9-200711270035" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031100" version="1" comment="pcre is &lt;4.4-109.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031101" version="1" comment="pcre-32bit is &lt;9-200711192343" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033329" version="1" comment="pcre-32bit is &lt;9-200711192344" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033330" version="1" comment="pcre-64bit is &lt;9-200711192338" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031102" version="1" comment="pcre-devel is &lt;4.4-109.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033331" version="1" comment="pcre-x86 is &lt;9-200711192343" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031103" version="1" comment="pcre is &lt;4.4-109.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031104" version="1" comment="mysql-Max is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031106" version="1" comment="mysql-client is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031107" version="1" comment="mysql-devel is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031108" version="1" comment="mysql-shared is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031109" version="1" comment="mysql is &lt;4.0.18-32.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033332" version="1" comment="gtk2-32bit is &lt;9-200701181648" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033333" version="1" comment="gtk2-32bit is &lt;9-200701181719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033334" version="1" comment="gtk2-64bit is &lt;9-200701181729" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033335" version="1" comment="gtk2-devel is &lt;2.2.4-125.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033336" version="1" comment="gtk2-doc is &lt;2.2.4-125.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033337" version="1" comment="gtk2-x86 is &lt;9-200701181805" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033338" version="1" comment="gtk2 is &lt;2.2.4-125.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031146" version="1" comment="dhcp-client is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031147" version="1" comment="dhcp-devel is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033339" version="1" comment="dhcp-relay is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031148" version="1" comment="dhcp-server is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031149" version="1" comment="dhcp is &lt;3.0.1rc13-28.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031151" version="1" comment="cups-client is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031152" version="1" comment="cups-devel is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033340" version="1" comment="cups-libs-32bit is &lt;9-200701262000" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031153" version="1" comment="cups-libs-32bit is &lt;9-200701262020" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033341" version="1" comment="cups-libs-64bit is &lt;9-200701262225" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033342" version="1" comment="cups-libs-x86 is &lt;9-200701262117" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031154" version="1" comment="cups-libs is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031155" version="1" comment="cups is &lt;1.1.20-108.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033343" version="1" comment="libgtop-devel is &lt;2.0.8-57.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033344" version="1" comment="libgtop is &lt;2.0.8-57.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033345" version="1" comment="qt3-32bit is &lt;9-200704031603" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031159" version="1" comment="qt3-32bit is &lt;9-200704031835" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033346" version="1" comment="qt3-64bit is &lt;9-200704031815" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033347" version="1" comment="qt3-devel-32bit is &lt;9-200704031603" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031160" version="1" comment="qt3-devel-32bit is &lt;9-200704031835" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033348" version="1" comment="qt3-devel-64bit is &lt;9-200704031815" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031161" version="1" comment="qt3-devel is &lt;3.3.1-36.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031162" version="1" comment="qt3-non-mt is &lt;3.3.1-41.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033349" version="1" comment="qt3-x86 is &lt;9-200704031929" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031163" version="1" comment="qt3 is &lt;3.3.1-36.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031164" version="1" comment="java2-jre is &lt;1.4.2-129.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031165" version="1" comment="java2 is &lt;1.4.2-129.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033350" version="1" comment="squid is &lt;2.5.STABLE5-42.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033351" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031195" version="1" comment="samba is &lt;3.0.20b-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033352" version="1" comment="kdelibs3-32bit is &lt;9-200704031603" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031196" version="1" comment="kdelibs3-32bit is &lt;9-200704031835" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033353" version="1" comment="kdelibs3-64bit is &lt;9-200704031815" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031197" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033354" version="1" comment="kdelibs3-x86 is &lt;9-200704031929" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031198" version="1" comment="kdelibs3 is &lt;3.2.1-44.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031199" version="1" comment="postgresql-contrib is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031200" version="1" comment="postgresql-devel is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031201" version="1" comment="postgresql-docs is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033355" version="1" comment="postgresql-libs-32bit is &lt;9-200704271719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031202" version="1" comment="postgresql-libs-32bit is &lt;9-200704271846" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033356" version="1" comment="postgresql-libs-64bit is &lt;9-200704271746" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033357" version="1" comment="postgresql-libs-x86 is &lt;9-200704271902" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031203" version="1" comment="postgresql-libs is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031204" version="1" comment="postgresql-pl is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031205" version="1" comment="postgresql-server is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031206" version="1" comment="postgresql is &lt;7.4.17-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033358" version="1" comment="xmms-32bit is &lt;9-200704052111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031207" version="1" comment="xmms-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033359" version="1" comment="xmms-64bit is &lt;9-200704052313" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033360" version="1" comment="xmms-devel is &lt;1.2.10-44.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033361" version="1" comment="xmms-x86 is &lt;9-200704052140" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031208" version="1" comment="xmms is &lt;1.2.10-44.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031209" version="1" comment="cups-client is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031210" version="1" comment="cups-devel is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031211" version="1" comment="cups-libs-32bit is &lt;9-200704210224" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033362" version="1" comment="cups-libs-32bit is &lt;9-200704210455" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033363" version="1" comment="cups-libs-64bit is &lt;9-200704210347" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033364" version="1" comment="cups-libs-x86 is &lt;9-200704210410" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031212" version="1" comment="cups-libs is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031213" version="1" comment="cups is &lt;1.1.20-108.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031214" version="1" comment="cups-client is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031215" version="1" comment="cups-devel is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031216" version="1" comment="cups-libs-32bit is &lt;9-200706090005" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033365" version="1" comment="cups-libs-64bit is &lt;9-200706090144" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033366" version="1" comment="cups-libs-x86 is &lt;9-200706082356" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031217" version="1" comment="cups-libs is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031218" version="1" comment="cups is &lt;1.1.20-108.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031219" version="1" comment="unrar is &lt;3.3.6-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033367" version="1" comment="clamav is &lt;0.90-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033368" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033369" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033370" version="1" comment="mod_php4-apache2 is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033371" version="1" comment="mod_php4-core is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033372" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033373" version="1" comment="php4-bcmath is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033374" version="1" comment="php4-bz2 is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033375" version="1" comment="php4-calendar is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033376" version="1" comment="php4-ctype is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033377" version="1" comment="php4-curl is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033378" version="1" comment="php4-dba is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033379" version="1" comment="php4-dbase is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033380" version="1" comment="php4-devel is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033381" version="1" comment="php4-domxml is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033382" version="1" comment="php4-exif is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033383" version="1" comment="php4-fastcgi is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033384" version="1" comment="php4-filepro is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033385" version="1" comment="php4-ftp is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033386" version="1" comment="php4-gd is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033387" version="1" comment="php4-gettext is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033388" version="1" comment="php4-gmp is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033389" version="1" comment="php4-iconv is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033390" version="1" comment="php4-imap is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033391" version="1" comment="php4-ldap is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033392" version="1" comment="php4-mbstring is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033393" version="1" comment="php4-mcal is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033394" version="1" comment="php4-mcrypt is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033395" version="1" comment="php4-mhash is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033396" version="1" comment="php4-mime_magic is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033397" version="1" comment="php4-mysql is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033398" version="1" comment="php4-pear is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033399" version="1" comment="php4-pgsql is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033400" version="1" comment="php4-qtdom is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033401" version="1" comment="php4-readline is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033402" version="1" comment="php4-recode is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033403" version="1" comment="php4-session is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033404" version="1" comment="php4-shmop is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033405" version="1" comment="php4-snmp is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033406" version="1" comment="php4-sockets is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033407" version="1" comment="php4-swf is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033408" version="1" comment="php4-sysvsem is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033409" version="1" comment="php4-sysvshm is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033410" version="1" comment="php4-unixODBC is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033411" version="1" comment="php4-wddx is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033412" version="1" comment="php4-xslt is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033413" version="1" comment="php4-yp is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033414" version="1" comment="php4-zlib is &lt;4.3.4-43.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031220" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031221" version="1" comment="XFree86-Xprt is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031222" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031223" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033415" version="1" comment="XFree86-libs-32bit is &lt;9-200704052111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031224" version="1" comment="XFree86-libs-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033416" version="1" comment="XFree86-libs-64bit is &lt;9-200704052313" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033417" version="1" comment="XFree86-libs-x86 is &lt;9-200704052140" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031225" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031226" version="1" comment="XFree86-server is &lt;4.3.99.902-43.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031230" version="1" comment="gpg is &lt;1.2.4-68.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033418" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033419" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033420" version="1" comment="mod_php4-apache2 is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033421" version="1" comment="mod_php4-core is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033422" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033423" version="1" comment="php4-bcmath is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033424" version="1" comment="php4-bz2 is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033425" version="1" comment="php4-calendar is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033426" version="1" comment="php4-ctype is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033427" version="1" comment="php4-curl is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033428" version="1" comment="php4-dba is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033429" version="1" comment="php4-dbase is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033430" version="1" comment="php4-devel is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033431" version="1" comment="php4-domxml is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033432" version="1" comment="php4-exif is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033433" version="1" comment="php4-fastcgi is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033434" version="1" comment="php4-filepro is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033435" version="1" comment="php4-ftp is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033436" version="1" comment="php4-gd is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033437" version="1" comment="php4-gettext is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033438" version="1" comment="php4-gmp is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033439" version="1" comment="php4-iconv is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033440" version="1" comment="php4-imap is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033441" version="1" comment="php4-ldap is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033442" version="1" comment="php4-mbstring is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033443" version="1" comment="php4-mcal is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033444" version="1" comment="php4-mcrypt is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033445" version="1" comment="php4-mhash is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033446" version="1" comment="php4-mime_magic is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033447" version="1" comment="php4-mysql is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033448" version="1" comment="php4-pear is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033449" version="1" comment="php4-pgsql is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033450" version="1" comment="php4-qtdom is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033451" version="1" comment="php4-readline is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033452" version="1" comment="php4-recode is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033453" version="1" comment="php4-session is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033454" version="1" comment="php4-shmop is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033455" version="1" comment="php4-snmp is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033456" version="1" comment="php4-sockets is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033457" version="1" comment="php4-swf is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033458" version="1" comment="php4-sysvsem is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033459" version="1" comment="php4-sysvshm is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033460" version="1" comment="php4-unixODBC is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033461" version="1" comment="php4-wddx is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033462" version="1" comment="php4-xslt is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033463" version="1" comment="php4-yp is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033464" version="1" comment="php4-zlib is &lt;4.3.4-43.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033465" version="1" comment="mod_perl is &lt;1.29-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033466" version="1" comment="freetype2-32bit is &lt;9-200704052111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031231" version="1" comment="freetype2-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033467" version="1" comment="freetype2-64bit is &lt;9-200704052313" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033468" version="1" comment="freetype2-devel-32bit is &lt;9-200704052111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031232" version="1" comment="freetype2-devel-32bit is &lt;9-200704052143" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033469" version="1" comment="freetype2-devel-64bit is &lt;9-200704052313" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031233" version="1" comment="freetype2-devel is &lt;2.1.7-53.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033470" version="1" comment="freetype2-x86 is &lt;9-200704052140" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031234" version="1" comment="freetype2 is &lt;2.1.7-53.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033471" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031235" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031236" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031237" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031238" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031239" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031240" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031242" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031243" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031244" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033472" version="1" comment="horde is &lt;2.2.5-63.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033473" version="1" comment="file-32bit is &lt;9-200703261518" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031247" version="1" comment="file-32bit is &lt;9-200703261521" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033474" version="1" comment="file-64bit is &lt;9-200703261528" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033475" version="1" comment="file-x86 is &lt;9-200703261519" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031248" version="1" comment="file is &lt;4.09-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033476" version="1" comment="clamav is &lt;0.90.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031251" version="1" comment="ipsec-tools is &lt;0.3.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033477" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033478" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033479" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033480" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031252" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031253" version="1" comment="xscreensaver is &lt;4.16-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033481" version="1" comment="quagga is &lt;0.96.4-31.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031255" version="1" comment="kdebase3-32bit is &lt;9-200705221253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033482" version="1" comment="kdebase3-32bit is &lt;9-200705221349" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033483" version="1" comment="kdebase3-64bit is &lt;9-200705221229" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033484" version="1" comment="kdebase3-x86 is &lt;9-200705221242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031256" version="1" comment="kdebase3 is &lt;3.2.1-68.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033485" version="1" comment="freeradius-devel is &lt;1.0.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033486" version="1" comment="freeradius is &lt;1.0.5-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033487" version="1" comment="python-32bit is &lt;9-200705252036" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031257" version="1" comment="python-32bit is &lt;9-200705260110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033488" version="1" comment="python-64bit is &lt;9-200705252330" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031258" version="1" comment="python-devel is &lt;2.3.3-88.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033489" version="1" comment="python-x86 is &lt;9-200705260247" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031259" version="1" comment="python is &lt;2.3.3-88.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033490" version="1" comment="libpng-32bit is &lt;9-200705252036" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031261" version="1" comment="libpng-32bit is &lt;9-200705260110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033491" version="1" comment="libpng-64bit is &lt;9-200705252330" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031262" version="1" comment="libpng-devel is &lt;1.2.5-182.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033492" version="1" comment="libpng-x86 is &lt;9-200705260247" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031263" version="1" comment="libpng is &lt;1.2.5-182.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033493" version="1" comment="libsmbclient-32bit is &lt;9-200705181232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031264" version="1" comment="libsmbclient-32bit is &lt;9-200705181249" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033494" version="1" comment="libsmbclient-64bit is &lt;9-200705181242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031265" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031266" version="1" comment="libsmbclient is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031267" version="1" comment="samba-client is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031268" version="1" comment="samba-doc is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031269" version="1" comment="samba-pdb is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031270" version="1" comment="samba-python is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031271" version="1" comment="samba-vscan is &lt;0.3.6b-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031272" version="1" comment="samba-winbind is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031273" version="1" comment="samba is &lt;3.0.20b-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033495" version="1" comment="libsmbclient-32bit is &lt;9-200706251715" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031275" version="1" comment="libsmbclient-32bit is &lt;9-200706251737" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033496" version="1" comment="libsmbclient-64bit is &lt;9-200706251754" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031276" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031277" version="1" comment="libsmbclient is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031278" version="1" comment="samba-client is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031279" version="1" comment="samba-doc is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031280" version="1" comment="samba-pdb is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031281" version="1" comment="samba-python is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031282" version="1" comment="samba-vscan is &lt;0.3.6b-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031283" version="1" comment="samba-winbind is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031284" version="1" comment="samba is &lt;3.0.20b-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033497" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033498" version="1" comment="kernel-debug is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031286" version="1" comment="kernel-default is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033499" version="1" comment="kernel-sn2 is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031288" version="1" comment="kernel-source is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031289" version="1" comment="kernel-syms is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033500" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033501" version="1" comment="kernel-s390x is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031285" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031287" version="1" comment="kernel-smp is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033502" version="1" comment="kernel-um is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033503" version="1" comment="um-host-install-initrd is &lt;1.0-48.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033504" version="1" comment="um-host-kernel is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033505" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033506" version="1" comment="kernel-s390 is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033507" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033508" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033509" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.287.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031290" version="1" comment="mysql-Max is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031292" version="1" comment="mysql-client is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031293" version="1" comment="mysql-devel is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031294" version="1" comment="mysql-shared is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031295" version="1" comment="mysql is &lt;4.0.18-32.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031297" version="1" comment="libexif is &lt;0.5.12-118.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033510" version="1" comment="clamav is &lt;0.90.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031298" version="1" comment="xfsdump is &lt;2.2.25-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033511" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033512" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033513" version="1" comment="mod_php4-apache2 is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033514" version="1" comment="mod_php4-core is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033515" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033516" version="1" comment="php4-bcmath is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033517" version="1" comment="php4-bz2 is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033518" version="1" comment="php4-calendar is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033519" version="1" comment="php4-ctype is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033520" version="1" comment="php4-curl is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033521" version="1" comment="php4-dba is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033522" version="1" comment="php4-dbase is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033523" version="1" comment="php4-devel is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033524" version="1" comment="php4-domxml is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033525" version="1" comment="php4-exif is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033526" version="1" comment="php4-fastcgi is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033527" version="1" comment="php4-filepro is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033528" version="1" comment="php4-ftp is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033529" version="1" comment="php4-gd is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033530" version="1" comment="php4-gettext is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033531" version="1" comment="php4-gmp is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033532" version="1" comment="php4-iconv is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033533" version="1" comment="php4-imap is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033534" version="1" comment="php4-ldap is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033535" version="1" comment="php4-mbstring is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033536" version="1" comment="php4-mcal is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033537" version="1" comment="php4-mcrypt is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033538" version="1" comment="php4-mhash is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033539" version="1" comment="php4-mime_magic is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033540" version="1" comment="php4-mysql is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033541" version="1" comment="php4-pear is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033542" version="1" comment="php4-pgsql is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033543" version="1" comment="php4-qtdom is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033544" version="1" comment="php4-readline is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033545" version="1" comment="php4-recode is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033546" version="1" comment="php4-session is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033547" version="1" comment="php4-shmop is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033548" version="1" comment="php4-snmp is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033549" version="1" comment="php4-sockets is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033550" version="1" comment="php4-swf is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033551" version="1" comment="php4-sysvsem is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033552" version="1" comment="php4-sysvshm is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033553" version="1" comment="php4-unixODBC is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033554" version="1" comment="php4-wddx is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033555" version="1" comment="php4-xslt is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033556" version="1" comment="php4-yp is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033557" version="1" comment="php4-zlib is &lt;4.3.4-43.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031299" version="1" comment="liblcms-32bit is &lt;9-200711060115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033558" version="1" comment="liblcms-64bit is &lt;9-200711060517" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031300" version="1" comment="liblcms-devel is &lt;1.12-55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033559" version="1" comment="liblcms-x86 is &lt;9-200711060115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031301" version="1" comment="liblcms is &lt;1.12-55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033560" version="1" comment="freetype2-32bit is &lt;9-200706160241" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031302" version="1" comment="freetype2-32bit is &lt;9-200706182342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033561" version="1" comment="freetype2-64bit is &lt;9-200706161829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033562" version="1" comment="freetype2-devel-32bit is &lt;9-200706160241" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031303" version="1" comment="freetype2-devel-32bit is &lt;9-200706182342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033563" version="1" comment="freetype2-devel-64bit is &lt;9-200706161829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031304" version="1" comment="freetype2-devel is &lt;2.1.7-53.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033564" version="1" comment="freetype2-x86 is &lt;9-200706182333" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031305" version="1" comment="freetype2 is &lt;2.1.7-53.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033565" version="1" comment="gd-devel is &lt;2.0.22-65.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033566" version="1" comment="gd is &lt;2.0.22-65.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033567" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.92.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033568" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.92.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033569" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.92.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033570" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.92.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033571" version="1" comment="emacs-el is &lt;21.3-185.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033572" version="1" comment="emacs-info is &lt;21.3-185.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033573" version="1" comment="emacs-nox is &lt;21.3-185.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033574" version="1" comment="emacs-x11 is &lt;21.3-185.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033575" version="1" comment="emacs is &lt;21.3-185.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031336" version="1" comment="bind-devel is &lt;9.2.3-76.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033576" version="1" comment="bind-utils-32bit is &lt;9-200707301359" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031337" version="1" comment="bind-utils-32bit is &lt;9-200707301447" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033577" version="1" comment="bind-utils-64bit is &lt;9-200707301401" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033578" version="1" comment="bind-utils-x86 is &lt;9-200707301447" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031338" version="1" comment="bind-utils is &lt;9.2.3-76.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031339" version="1" comment="bind is &lt;9.2.3-76.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031342" version="1" comment="gvim is &lt;6.2-235.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033579" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031345" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031346" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031347" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031348" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031349" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031350" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031352" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031353" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031354" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033580" version="1" comment="libvorbis-32bit is &lt;9-200707091422" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031355" version="1" comment="libvorbis-32bit is &lt;9-200707091633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033581" version="1" comment="libvorbis-64bit is &lt;9-200707091536" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031356" version="1" comment="libvorbis-devel is &lt;1.0.1-56.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033582" version="1" comment="libvorbis-x86 is &lt;9-200707091629" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031357" version="1" comment="libvorbis is &lt;1.0.1-56.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031364" version="1" comment="perl-Net-DNS is &lt;0.46-27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031365" version="1" comment="cups-client is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031366" version="1" comment="cups-devel is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033583" version="1" comment="cups-libs-32bit is &lt;9-200708071549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031367" version="1" comment="cups-libs-32bit is &lt;9-200708071552" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033584" version="1" comment="cups-libs-64bit is &lt;9-200708071548" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033585" version="1" comment="cups-libs-x86 is &lt;9-200708071552" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031368" version="1" comment="cups-libs is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031369" version="1" comment="cups is &lt;1.1.20-108.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033586" version="1" comment="qt3-32bit is &lt;9-200707162050" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031370" version="1" comment="qt3-32bit is &lt;9-200707170221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033587" version="1" comment="qt3-64bit is &lt;9-200707162127" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033588" version="1" comment="qt3-devel-32bit is &lt;9-200707162050" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031371" version="1" comment="qt3-devel-32bit is &lt;9-200707170221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033589" version="1" comment="qt3-devel-64bit is &lt;9-200707162127" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031372" version="1" comment="qt3-devel is &lt;3.3.1-36.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031373" version="1" comment="qt3-non-mt is &lt;3.3.1-41.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033590" version="1" comment="qt3-x86 is &lt;9-200707170258" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031374" version="1" comment="qt3 is &lt;3.3.1-36.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031375" version="1" comment="ethereal is &lt;0.10.13-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033591" version="1" comment="gd-devel is &lt;2.0.22-65.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033592" version="1" comment="gd is &lt;2.0.22-65.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033593" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033594" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033595" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033596" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033597" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033598" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033599" version="1" comment="clamav is &lt;0.91.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031376" version="1" comment="tcpdump is &lt;3.8.1-49.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033600" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033601" version="1" comment="kernel-debug is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031378" version="1" comment="kernel-default is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033602" version="1" comment="kernel-sn2 is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031380" version="1" comment="kernel-source is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031381" version="1" comment="kernel-syms is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033603" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033604" version="1" comment="kernel-s390 is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031379" version="1" comment="kernel-smp is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033605" version="1" comment="kernel-xen is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033606" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033607" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033608" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033609" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033610" version="1" comment="kernel-s390x is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031377" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033611" version="1" comment="kernel-um is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033612" version="1" comment="kernel-xenpae is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033613" version="1" comment="um-host-install-initrd is &lt;1.0-48.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033614" version="1" comment="um-host-kernel is &lt;2.6.5-7.311" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033615" version="1" comment="libvorbis-32bit is &lt;9-200710221437" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031382" version="1" comment="libvorbis-32bit is &lt;9-200710221440" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033616" version="1" comment="libvorbis-64bit is &lt;9-200710221441" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031383" version="1" comment="libvorbis-devel is &lt;1.0.1-56.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033617" version="1" comment="libvorbis-x86 is &lt;9-200710221440" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031384" version="1" comment="libvorbis is &lt;1.0.1-56.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031385" version="1" comment="t1lib-devel is &lt;1.3.1-569.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031386" version="1" comment="t1lib is &lt;1.3.1-569.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031387" version="1" comment="rsync is &lt;2.6.2-8.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033618" version="1" comment="qt3-32bit is &lt;9-200709191342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031388" version="1" comment="qt3-32bit is &lt;9-200709191359" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033619" version="1" comment="qt3-64bit is &lt;9-200709191336" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033620" version="1" comment="qt3-devel-32bit is &lt;9-200709191342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031389" version="1" comment="qt3-devel-32bit is &lt;9-200709191359" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033621" version="1" comment="qt3-devel-64bit is &lt;9-200709191336" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031390" version="1" comment="qt3-devel-doc is &lt;3.3.1-36.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031391" version="1" comment="qt3-devel-tools is &lt;3.3.1-35.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031392" version="1" comment="qt3-devel is &lt;3.3.1-36.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031393" version="1" comment="qt3-non-mt is &lt;3.3.1-41.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033622" version="1" comment="qt3-x86 is &lt;9-200709191359" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031394" version="1" comment="qt3 is &lt;3.3.1-36.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033623" version="1" comment="kdelibs3-32bit is &lt;9-200709251549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031395" version="1" comment="kdelibs3-32bit is &lt;9-200709251619" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033624" version="1" comment="kdelibs3-64bit is &lt;9-200709251619" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031396" version="1" comment="kdelibs3-devel-doc is &lt;3.2.1-44.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031397" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033625" version="1" comment="kdelibs3-x86 is &lt;9-200709251619" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031398" version="1" comment="kdelibs3 is &lt;3.2.1-44.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031402" version="1" comment="cups-client is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031403" version="1" comment="cups-devel is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031404" version="1" comment="cups-libs-32bit is &lt;9-200711080439" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033626" version="1" comment="cups-libs-32bit is &lt;9-200711080705" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033627" version="1" comment="cups-libs-64bit is &lt;9-200711080640" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033628" version="1" comment="cups-libs-x86 is &lt;9-200711080439" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031405" version="1" comment="cups-libs is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031406" version="1" comment="cups is &lt;1.1.20-108.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033629" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033630" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031407" version="1" comment="findutils-locate is &lt;4.1.7-860.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031408" version="1" comment="id3lib-devel is &lt;3.8.3-86.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031409" version="1" comment="id3lib-examples is &lt;3.8.3-86.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031410" version="1" comment="id3lib is &lt;3.8.3-86.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031411" version="1" comment="cpio is &lt;2.5-324.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033631" version="1" comment="clamav is &lt;0.91.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031412" version="1" comment="fetchmail is &lt;6.2.5-49.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031413" version="1" comment="fetchmailconf is &lt;6.2.5-49.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033632" version="1" comment="libsmbclient-32bit is &lt;9-200711231828" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031415" version="1" comment="libsmbclient-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033633" version="1" comment="libsmbclient-64bit is &lt;9-200711240034" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031416" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031417" version="1" comment="libsmbclient is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033634" version="1" comment="samba-32bit is &lt;9-200711231828" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031418" version="1" comment="samba-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033635" version="1" comment="samba-client-32bit is &lt;9-200711231828" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031419" version="1" comment="samba-client-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031420" version="1" comment="samba-client is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031421" version="1" comment="samba-doc is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031422" version="1" comment="samba-pdb is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031423" version="1" comment="samba-python is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031424" version="1" comment="samba-vscan is &lt;0.3.6b-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033636" version="1" comment="samba-winbind-32bit is &lt;9-200711231828" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031425" version="1" comment="samba-winbind-32bit is &lt;9-200711231829" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031426" version="1" comment="samba-winbind is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031427" version="1" comment="samba is &lt;3.0.20b-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031428" version="1" comment="flac-32bit is &lt;9-200710182357" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033637" version="1" comment="flac-32bit is &lt;9-200710182359" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033638" version="1" comment="flac-64bit is &lt;9-200710190001" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031429" version="1" comment="flac-devel is &lt;1.1.0-387.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033639" version="1" comment="flac-x86 is &lt;9-200710182357" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033640" version="1" comment="flac-xmms is &lt;1.1.0-387.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031430" version="1" comment="flac is &lt;1.1.0-387.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031431" version="1" comment="openssh-askpass is &lt;4.1p1-11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031432" version="1" comment="openssh is &lt;4.1p1-11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031433" version="1" comment="postgresql-contrib is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031434" version="1" comment="postgresql-devel is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031435" version="1" comment="postgresql-docs is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031436" version="1" comment="postgresql-libs-32bit is &lt;9-200801312100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033641" version="1" comment="postgresql-libs-32bit is &lt;9-200801312226" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033642" version="1" comment="postgresql-libs-64bit is &lt;9-200802010511" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033643" version="1" comment="postgresql-libs-x86 is &lt;9-200801312100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031437" version="1" comment="postgresql-libs is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031438" version="1" comment="postgresql-pl is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031439" version="1" comment="postgresql-server is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031440" version="1" comment="postgresql is &lt;7.4.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033644" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031477" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031478" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031479" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031480" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031481" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031482" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031484" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031485" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031486" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031489" version="1" comment="python-32bit is &lt;9-200801101709" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033645" version="1" comment="python-32bit is &lt;9-200801101710" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033646" version="1" comment="python-64bit is &lt;9-200801101711" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031490" version="1" comment="python-curses is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031491" version="1" comment="python-demo is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031492" version="1" comment="python-devel is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031493" version="1" comment="python-doc-pdf is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031494" version="1" comment="python-doc is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031495" version="1" comment="python-gdbm is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031496" version="1" comment="python-idle is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031497" version="1" comment="python-mpz is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031498" version="1" comment="python-tk is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033647" version="1" comment="python-x86 is &lt;9-200801101709" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031499" version="1" comment="python-xml is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031500" version="1" comment="python is &lt;2.3.3-88.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031504" version="1" comment="apache2-devel is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033648" version="1" comment="apache2-doc is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033649" version="1" comment="apache2-example-pages is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031505" version="1" comment="apache2-prefork is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031506" version="1" comment="apache2-worker is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031507" version="1" comment="apache2 is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031503" version="1" comment="libapr0 is &lt;2.0.59-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031508" version="1" comment="perl-32bit is &lt;9-200711080056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033650" version="1" comment="perl-32bit is &lt;9-200711080236" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033651" version="1" comment="perl-64bit is &lt;9-200711080056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033652" version="1" comment="perl-x86 is &lt;9-200711080056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031509" version="1" comment="perl is &lt;5.8.3-32.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031510" version="1" comment="openssl-32bit is &lt;9-200710031457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033653" version="1" comment="openssl-32bit is &lt;9-200710031500" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033654" version="1" comment="openssl-64bit is &lt;9-200710031513" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031511" version="1" comment="openssl-devel-32bit is &lt;9-200710031457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033655" version="1" comment="openssl-devel-32bit is &lt;9-200710031500" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033656" version="1" comment="openssl-devel-64bit is &lt;9-200710031513" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031512" version="1" comment="openssl-devel is &lt;0.9.7d-15.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031513" version="1" comment="openssl-doc is &lt;0.9.7d-15.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033657" version="1" comment="openssl-x86 is &lt;9-200710031457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031514" version="1" comment="openssl is &lt;0.9.7d-15.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033658" version="1" comment="tk-32bit is &lt;9-200710031441" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031515" version="1" comment="tk-32bit is &lt;9-200710031447" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033659" version="1" comment="tk-64bit is &lt;9-200710031452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031516" version="1" comment="tk-devel is &lt;8.4.6-41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033660" version="1" comment="tk-x86 is &lt;9-200710031447" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031517" version="1" comment="tk is &lt;8.4.6-41.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033661" version="1" comment="nagios-plugins-extras is &lt;1.3.1-270.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033662" version="1" comment="nagios-plugins is &lt;1.3.1-270.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031518" version="1" comment="java2-jre is &lt;1.4.2-129.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033663" version="1" comment="java2-jre is &lt;1.4.2-129.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031519" version="1" comment="java2 is &lt;1.4.2-129.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033664" version="1" comment="java2 is &lt;1.4.2-129.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033665" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033666" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033667" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033668" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033669" version="1" comment="libpng-32bit is &lt;9-200711060113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031520" version="1" comment="libpng-32bit is &lt;9-200711060115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033670" version="1" comment="libpng-64bit is &lt;9-200711060514" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031521" version="1" comment="libpng-devel is &lt;1.2.5-182.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033671" version="1" comment="libpng-x86 is &lt;9-200711060115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031522" version="1" comment="libpng is &lt;1.2.5-182.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033672" version="1" comment="e2fsprogs-32bit is &lt;9-200711231615" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031524" version="1" comment="e2fsprogs-32bit is &lt;9-200711231622" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033673" version="1" comment="e2fsprogs-64bit is &lt;9-200711231617" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033674" version="1" comment="e2fsprogs-devel-32bit is &lt;9-200711231615" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031525" version="1" comment="e2fsprogs-devel-32bit is &lt;9-200711231622" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033675" version="1" comment="e2fsprogs-devel-64bit is &lt;9-200711231617" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031526" version="1" comment="e2fsprogs-devel is &lt;1.38-4.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033676" version="1" comment="e2fsprogs-x86 is &lt;9-200711231622" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031527" version="1" comment="e2fsprogs is &lt;1.38-4.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031528" version="1" comment="XFree86-libs-32bit is &lt;9-200801062003" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033677" version="1" comment="XFree86-libs-64bit is &lt;9-200801062030" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033678" version="1" comment="XFree86-libs-x86 is &lt;9-200801062003" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031529" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031530" version="1" comment="XFree86-server is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031531" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031532" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.94" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033679" version="1" comment="nss_ldap-32bit is &lt;9-200712041545" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031533" version="1" comment="nss_ldap-32bit is &lt;9-200712041546" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033680" version="1" comment="nss_ldap-64bit is &lt;9-200712041544" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033681" version="1" comment="nss_ldap-x86 is &lt;9-200712041546" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031534" version="1" comment="nss_ldap is &lt;215-59.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033682" version="1" comment="net-snmp-32bit is &lt;9-200711271522" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031535" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031536" version="1" comment="net-snmp is &lt;5.1.3.1-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031537" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031538" version="1" comment="cups-client is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031539" version="1" comment="cups-devel is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033683" version="1" comment="cups-libs-32bit is &lt;9-200712111650" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031540" version="1" comment="cups-libs-32bit is &lt;9-200712111651" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033684" version="1" comment="cups-libs-64bit is &lt;9-200712111655" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033685" version="1" comment="cups-libs-x86 is &lt;9-200712111651" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031541" version="1" comment="cups-libs is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031542" version="1" comment="cups is &lt;1.1.20-108.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033686" version="1" comment="heimdal-devel-32bit is &lt;9-200712111656" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031556" version="1" comment="heimdal-devel-32bit is &lt;9-200712111659" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033687" version="1" comment="heimdal-devel-64bit is &lt;9-200712111705" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031557" version="1" comment="heimdal-devel is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033688" version="1" comment="heimdal-lib-32bit is &lt;9-200712111656" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031558" version="1" comment="heimdal-lib-32bit is &lt;9-200712111659" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033689" version="1" comment="heimdal-lib-64bit is &lt;9-200712111705" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033690" version="1" comment="heimdal-lib-x86 is &lt;9-200712111659" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031559" version="1" comment="heimdal-lib is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031560" version="1" comment="heimdal-tools is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031561" version="1" comment="heimdal is &lt;0.6.1rc3-55.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033691" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031562" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031563" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031564" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031565" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031566" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031567" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031569" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031570" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031571" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033692" version="1" comment="libsmbclient-32bit is &lt;9-200712041729" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031575" version="1" comment="libsmbclient-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033693" version="1" comment="libsmbclient-64bit is &lt;9-200712041730" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031576" version="1" comment="libsmbclient-devel is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031577" version="1" comment="libsmbclient is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033694" version="1" comment="samba-32bit is &lt;9-200712041729" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031578" version="1" comment="samba-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033695" version="1" comment="samba-client-32bit is &lt;9-200712041729" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031579" version="1" comment="samba-client-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031580" version="1" comment="samba-client is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031581" version="1" comment="samba-doc is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031582" version="1" comment="samba-pdb is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031583" version="1" comment="samba-python is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031584" version="1" comment="samba-vscan is &lt;0.3.6b-0.26.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033696" version="1" comment="samba-winbind-32bit is &lt;9-200712041729" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031585" version="1" comment="samba-winbind-32bit is &lt;9-200712041731" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031586" version="1" comment="samba-winbind is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031587" version="1" comment="samba is &lt;3.0.20b-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031588" version="1" comment="ethereal is &lt;0.10.13-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031589" version="1" comment="yast2-core-devel is &lt;2.9.98.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031590" version="1" comment="yast2-core is &lt;2.9.98.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031591" version="1" comment="rsync is &lt;2.6.8-53.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062112" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062113" version="1" comment="kernel-debug is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062114" version="1" comment="kernel-default is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062115" version="1" comment="kernel-smp is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062116" version="1" comment="kernel-source is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062117" version="1" comment="kernel-syms is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062118" version="1" comment="kernel-um is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062119" version="1" comment="kernel-xen is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062120" version="1" comment="kernel-xenpae is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062121" version="1" comment="um-host-install-initrd is &lt;1.0-48.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062122" version="1" comment="um-host-kernel is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062123" version="1" comment="xen-kmp is &lt;3.0.4_2.6.5_7.323-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062124" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062125" version="1" comment="kernel-s390x is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062126" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062127" version="1" comment="kernel-sn2 is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062128" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062129" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062130" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062131" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062132" version="1" comment="kernel-s390 is &lt;2.6.5-7.323" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033697" version="1" comment="squid is &lt;2.5.STABLE5-42.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033698" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033699" version="1" comment="kernel-s390 is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031595" version="1" comment="kernel-source is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031596" version="1" comment="kernel-syms is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033700" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033701" version="1" comment="kernel-s390x is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031592" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033702" version="1" comment="kernel-debug is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031593" version="1" comment="kernel-default is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031594" version="1" comment="kernel-smp is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033703" version="1" comment="kernel-um is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033704" version="1" comment="kernel-xen is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033705" version="1" comment="kernel-xenpae is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033706" version="1" comment="um-host-install-initrd is &lt;1.0-48.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033707" version="1" comment="um-host-kernel is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033708" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033709" version="1" comment="kernel-sn2 is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033710" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033711" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033712" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033713" version="1" comment="libxml2-32bit is &lt;9-200712191219" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031597" version="1" comment="libxml2-32bit is &lt;9-200712191220" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033714" version="1" comment="libxml2-64bit is &lt;9-200712191222" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031598" version="1" comment="libxml2-devel is &lt;2.6.7-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033715" version="1" comment="libxml2-x86 is &lt;9-200712191220" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031600" version="1" comment="libxml2 is &lt;2.6.7-28.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033716" version="1" comment="clamav is &lt;0.92-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031602" version="1" comment="libexif is &lt;0.5.12-118.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033717" version="1" comment="clamav is &lt;0.93-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031603" version="1" comment="openldap2-back-ldap is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031604" version="1" comment="openldap2-back-meta is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031605" version="1" comment="openldap2-back-monitor is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031606" version="1" comment="openldap2-back-perl is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031607" version="1" comment="openldap2-client-32bit is &lt;9-200802110138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033718" version="1" comment="openldap2-client-64bit is &lt;9-200802110139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033719" version="1" comment="openldap2-client-x86 is &lt;9-200802110138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031608" version="1" comment="openldap2-client is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031609" version="1" comment="openldap2-devel-32bit is &lt;9-200802110138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033720" version="1" comment="openldap2-devel-64bit is &lt;9-200802110139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031610" version="1" comment="openldap2-devel is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031611" version="1" comment="openldap2 is &lt;2.2.24-4.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033721" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033722" version="1" comment="kernel-debug is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031613" version="1" comment="kernel-default is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033723" version="1" comment="kernel-sn2 is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031615" version="1" comment="kernel-source is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031616" version="1" comment="kernel-syms is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033724" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033725" version="1" comment="kernel-s390 is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033726" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033727" version="1" comment="kernel-s390x is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031614" version="1" comment="kernel-smp is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033728" version="1" comment="kernel-xen is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033729" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033730" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033731" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031612" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033732" version="1" comment="kernel-um is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033733" version="1" comment="kernel-xenpae is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033734" version="1" comment="um-host-install-initrd is &lt;1.0-48.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033735" version="1" comment="um-host-kernel is &lt;2.6.5-7.314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033736" version="1" comment="libmikmod-32bit is &lt;9-200902271552" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031617" version="1" comment="libmikmod-32bit is &lt;9-200902271558" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033737" version="1" comment="libmikmod-64bit is &lt;9-200902280719" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033738" version="1" comment="libmikmod-x86 is &lt;9-200902271558" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031618" version="1" comment="libmikmod is &lt;3.1.10-662.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031619" version="1" comment="ghostscript-fonts-other is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031620" version="1" comment="ghostscript-fonts-rus is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031621" version="1" comment="ghostscript-fonts-std is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031622" version="1" comment="ghostscript-library is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031623" version="1" comment="ghostscript-serv is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031624" version="1" comment="ghostscript-x11 is &lt;7.07.1rc1-195.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031625" version="1" comment="libgimpprint-devel is &lt;4.2.6-46.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031626" version="1" comment="libgimpprint is &lt;4.2.6-46.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033739" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031631" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031632" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031633" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031634" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031635" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031636" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031638" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031639" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031640" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033740" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031645" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031646" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031647" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031648" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031649" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031650" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031652" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031653" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031654" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031655" version="1" comment="cups-client is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031656" version="1" comment="cups-devel is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031657" version="1" comment="cups-libs-32bit is &lt;9-200803201838" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033741" version="1" comment="cups-libs-32bit is &lt;9-200803201848" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033742" version="1" comment="cups-libs-64bit is &lt;9-200803210144" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033743" version="1" comment="cups-libs-x86 is &lt;9-200803201838" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031658" version="1" comment="cups-libs is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031659" version="1" comment="cups is &lt;1.1.20-108.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031668" version="1" comment="bind-devel is &lt;9.3.4-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031669" version="1" comment="bind-utils-32bit is &lt;9-200801211531" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033744" version="1" comment="bind-utils-32bit is &lt;9-200801211534" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033745" version="1" comment="bind-utils-64bit is &lt;9-200801211546" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033746" version="1" comment="bind-utils-x86 is &lt;9-200801211531" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031670" version="1" comment="bind-utils is &lt;9.3.4-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031671" version="1" comment="bind is &lt;9.3.4-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033747" version="1" comment="clamav is &lt;0.92.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031677" version="1" comment="ghostscript-fonts-other is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031678" version="1" comment="ghostscript-fonts-rus is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031679" version="1" comment="ghostscript-fonts-std is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031680" version="1" comment="ghostscript-library is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031681" version="1" comment="ghostscript-serv is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031682" version="1" comment="ghostscript-x11 is &lt;7.07.1rc1-195.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031683" version="1" comment="libgimpprint-devel is &lt;4.2.6-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031684" version="1" comment="libgimpprint is &lt;4.2.6-46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033748" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031687" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031688" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031689" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031690" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031691" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031692" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031694" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031695" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031696" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031697" version="1" comment="tk-32bit is &lt;9-200802060128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033749" version="1" comment="tk-64bit is &lt;9-200802060127" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031698" version="1" comment="tk-devel is &lt;8.4.6-41.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033750" version="1" comment="tk-x86 is &lt;9-200802060128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031699" version="1" comment="tk is &lt;8.4.6-41.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031700" version="1" comment="libnetpbm is &lt;1.0.0-618.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031701" version="1" comment="netpbm is &lt;10.11.4-172.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031702" version="1" comment="mailman is &lt;2.1.4-83.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031703" version="1" comment="cups-client is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031704" version="1" comment="cups-devel is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031705" version="1" comment="cups-libs-32bit is &lt;9-200803040015" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033751" version="1" comment="cups-libs-32bit is &lt;9-200803040018" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033752" version="1" comment="cups-libs-64bit is &lt;9-200803040013" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033753" version="1" comment="cups-libs-x86 is &lt;9-200803040015" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031706" version="1" comment="cups-libs is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031707" version="1" comment="cups is &lt;1.1.20-108.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033754" version="1" comment="net-snmp-32bit is &lt;9-200807112021" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031709" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031710" version="1" comment="net-snmp is &lt;5.1.3.1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031711" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031712" version="1" comment="ethereal is &lt;0.10.13-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031718" version="1" comment="libsmbclient-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033755" version="1" comment="libsmbclient-32bit is &lt;9-200805282145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033756" version="1" comment="libsmbclient-64bit is &lt;9-200805282149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031719" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031720" version="1" comment="libsmbclient is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031721" version="1" comment="samba-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033757" version="1" comment="samba-32bit is &lt;9-200805282145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031722" version="1" comment="samba-client-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033758" version="1" comment="samba-client-32bit is &lt;9-200805282145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031723" version="1" comment="samba-client is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031724" version="1" comment="samba-doc is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031725" version="1" comment="samba-pdb is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031726" version="1" comment="samba-python is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031727" version="1" comment="samba-vscan is &lt;0.3.6b-0.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031728" version="1" comment="samba-winbind-32bit is &lt;9-200805282142" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033759" version="1" comment="samba-winbind-32bit is &lt;9-200805282145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031729" version="1" comment="samba-winbind is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031730" version="1" comment="samba is &lt;3.0.26a-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031734" version="1" comment="ruby is &lt;1.8.1-42.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031735" version="1" comment="java2-jre is &lt;1.4.2-129.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031736" version="1" comment="java2 is &lt;1.4.2-129.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033760" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033761" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033762" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033763" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031737" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031738" version="1" comment="bzip2-32bit is &lt;9-200803201535" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033764" version="1" comment="bzip2-32bit is &lt;9-200803201536" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033765" version="1" comment="bzip2-64bit is &lt;9-200803201536" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033766" version="1" comment="bzip2-x86 is &lt;9-200803201535" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031739" version="1" comment="bzip2 is &lt;1.0.2-346.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031740" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031741" version="1" comment="XFree86-Xprt is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031742" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031743" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031744" version="1" comment="XFree86-server is &lt;4.3.99.902-43.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031745" version="1" comment="libpng-32bit is &lt;9-200804151618" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033767" version="1" comment="libpng-64bit is &lt;9-200804151629" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033768" version="1" comment="libpng-devel-64bit is &lt;9-200804151629" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031746" version="1" comment="libpng-devel is &lt;1.2.5-182.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033769" version="1" comment="libpng-x86 is &lt;9-200804151618" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031747" version="1" comment="libpng is &lt;1.2.5-182.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033770" version="1" comment="clamav is &lt;0.94-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063329" version="1" comment="glibc-32bit is &lt;9-201008251343" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063330" version="1" comment="glibc-32bit is &lt;9-201008251911" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063331" version="1" comment="glibc-64bit is &lt;9-201008251703" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063332" version="1" comment="glibc-devel-32bit is &lt;9-201008251304" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063333" version="1" comment="glibc-devel-32bit is &lt;9-201008251343" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063334" version="1" comment="glibc-devel-64bit is &lt;9-201008251703" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063335" version="1" comment="glibc-devel is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063336" version="1" comment="glibc-html is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063337" version="1" comment="glibc-i18ndata is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063338" version="1" comment="glibc-info is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063339" version="1" comment="glibc-locale-32bit is &lt;9-201008251304" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063340" version="1" comment="glibc-locale-32bit is &lt;9-201008251343" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063341" version="1" comment="glibc-locale-64bit is &lt;9-201008251703" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063342" version="1" comment="glibc-locale-x86 is &lt;9-201008251304" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063343" version="1" comment="glibc-locale is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063344" version="1" comment="glibc-profile-64bit is &lt;9-201008251703" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063345" version="1" comment="glibc-profile is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063346" version="1" comment="glibc-x86 is &lt;9-201008251911" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063347" version="1" comment="glibc is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063348" version="1" comment="nscd is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063349" version="1" comment="timezone is &lt;2.3.3-98.114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031748" version="1" comment="libvorbis-32bit is &lt;9-200805201623" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033771" version="1" comment="libvorbis-32bit is &lt;9-200805201625" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033772" version="1" comment="libvorbis-64bit is &lt;9-200805201623" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031749" version="1" comment="libvorbis-devel is &lt;1.0.1-56.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033773" version="1" comment="libvorbis-x86 is &lt;9-200805201623" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031750" version="1" comment="libvorbis is &lt;1.0.1-56.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031751" version="1" comment="bind-devel is &lt;9.3.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033774" version="1" comment="bind-utils-32bit is &lt;9-200806171754" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031752" version="1" comment="bind-utils-32bit is &lt;9-200806172350" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033775" version="1" comment="bind-utils-64bit is &lt;9-200806172216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033776" version="1" comment="bind-utils-x86 is &lt;9-200806172350" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031753" version="1" comment="bind-utils is &lt;9.3.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031754" version="1" comment="bind is &lt;9.3.4-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031760" version="1" comment="openssh-askpass is &lt;4.1p1-11.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031761" version="1" comment="openssh is &lt;4.1p1-11.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033777" version="1" comment="squid is &lt;2.5.STABLE5-42.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031762" version="1" comment="python-32bit is &lt;9-200808010009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033778" version="1" comment="python-32bit is &lt;9-200808010012" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033779" version="1" comment="python-64bit is &lt;9-200808010015" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031763" version="1" comment="python-curses is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031764" version="1" comment="python-demo is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031765" version="1" comment="python-devel is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031766" version="1" comment="python-doc-pdf is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031767" version="1" comment="python-doc is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031768" version="1" comment="python-gdbm is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031769" version="1" comment="python-idle is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031770" version="1" comment="python-mpz is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031771" version="1" comment="python-tk is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033780" version="1" comment="python-x86 is &lt;9-200808010009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031772" version="1" comment="python-xml is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031773" version="1" comment="python is &lt;2.3.3-88.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031774" version="1" comment="xscreensaver-gnome is &lt;4.16-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031775" version="1" comment="xscreensaver is &lt;4.16-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031785" version="1" comment="cups-client is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031786" version="1" comment="cups-devel is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031787" version="1" comment="cups-libs-32bit is &lt;9-200804172236" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033781" version="1" comment="cups-libs-32bit is &lt;9-200804172237" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033782" version="1" comment="cups-libs-64bit is &lt;9-200804172236" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033783" version="1" comment="cups-libs-x86 is &lt;9-200804172236" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031788" version="1" comment="cups-libs is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031789" version="1" comment="cups is &lt;1.1.20-108.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033784" version="1" comment="libxslt-32bit is &lt;9-200805201625" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031790" version="1" comment="libxslt-32bit is &lt;9-200805201632" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033785" version="1" comment="libxslt-64bit is &lt;9-200805201632" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031791" version="1" comment="libxslt-devel is &lt;1.1.2-58.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033786" version="1" comment="libxslt-x86 is &lt;9-200805201632" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031792" version="1" comment="libxslt is &lt;1.1.2-58.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033787" version="1" comment="freetype2-32bit is &lt;9-200806161815" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031794" version="1" comment="freetype2-32bit is &lt;9-200806170342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033788" version="1" comment="freetype2-64bit is &lt;9-200806162314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033789" version="1" comment="freetype2-devel-32bit is &lt;9-200806161815" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031795" version="1" comment="freetype2-devel-32bit is &lt;9-200806170342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033790" version="1" comment="freetype2-devel-64bit is &lt;9-200806162314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031796" version="1" comment="freetype2-devel is &lt;2.1.7-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033791" version="1" comment="freetype2-x86 is &lt;9-200806170342" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031797" version="1" comment="freetype2 is &lt;2.1.7-53.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031798" version="1" comment="perl-32bit is &lt;9-200807111457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033792" version="1" comment="perl-32bit is &lt;9-200807111506" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033793" version="1" comment="perl-64bit is &lt;9-200807111454" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033794" version="1" comment="perl-x86 is &lt;9-200807111457" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031799" version="1" comment="perl is &lt;5.8.3-32.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031802" version="1" comment="gnutls-devel is &lt;1.0.8-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031803" version="1" comment="gnutls is &lt;1.0.8-26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033799" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033800" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033801" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033802" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033803" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033804" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033805" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033806" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031804" version="1" comment="java2-jre is &lt;1.4.2-129.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031805" version="1" comment="java2 is &lt;1.4.2-129.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033807" version="1" comment="emacs-el is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031809" version="1" comment="emacs-info is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031810" version="1" comment="emacs-nox is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033808" version="1" comment="emacs-x11 is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031811" version="1" comment="emacs is &lt;21.3-185.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031812" version="1" comment="opensc-devel is &lt;0.8.0-194.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031813" version="1" comment="opensc is &lt;0.8.0-194.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031814" version="1" comment="opensc-devel is &lt;0.8.0-194.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031815" version="1" comment="opensc is &lt;0.8.0-194.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033809" version="1" comment="libtiff-32bit is &lt;9-200808201412" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031846" version="1" comment="libtiff-32bit is &lt;9-200808201417" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033810" version="1" comment="libtiff-64bit is &lt;9-200808201414" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033811" version="1" comment="libtiff-x86 is &lt;9-200808201417" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031847" version="1" comment="libtiff is &lt;3.6.1-38.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033812" version="1" comment="vsftpd is &lt;2.0.4-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031848" version="1" comment="XFree86-server is &lt;4.3.99.902-43.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031849" version="1" comment="XFree86 is &lt;4.3.99.902-43.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031850" version="1" comment="acroread is &lt;7.0.9-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031851" version="1" comment="gvim is &lt;6.2-235.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009030999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033813" version="1" comment="clamav is &lt;0.93.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033814" version="1" comment="clamav is &lt;0.93.3-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031852" version="1" comment="postfix is &lt;2.1.1-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031854" version="1" comment="apache2-devel is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033815" version="1" comment="apache2-doc is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033816" version="1" comment="apache2-example-pages is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031855" version="1" comment="apache2-prefork is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031856" version="1" comment="apache2-worker is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031857" version="1" comment="apache2 is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031853" version="1" comment="libapr0 is &lt;2.0.59-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031858" version="1" comment="openldap2-back-ldap is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031859" version="1" comment="openldap2-back-meta is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031860" version="1" comment="openldap2-back-monitor is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031861" version="1" comment="openldap2-back-perl is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031862" version="1" comment="openldap2-client-32bit is &lt;9-200808130009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033817" version="1" comment="openldap2-client-32bit is &lt;9-200808130018" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033818" version="1" comment="openldap2-client-64bit is &lt;9-200808130011" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033819" version="1" comment="openldap2-client-x86 is &lt;9-200808130009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031863" version="1" comment="openldap2-client is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031864" version="1" comment="openldap2-devel-32bit is &lt;9-200808130009" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033820" version="1" comment="openldap2-devel-32bit is &lt;9-200808130018" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033821" version="1" comment="openldap2-devel-64bit is &lt;9-200808130011" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031865" version="1" comment="openldap2-devel is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031866" version="1" comment="openldap2 is &lt;2.2.24-4.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033822" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033823" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033824" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033825" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033826" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033827" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033828" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033829" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033830" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033831" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031867" version="1" comment="java2-jre is &lt;1.4.2-129.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031868" version="1" comment="java2 is &lt;1.4.2-129.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033832" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033833" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031869" version="1" comment="ethereal is &lt;0.10.13-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033834" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033835" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033836" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033837" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031875" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031876" version="1" comment="libxml2-32bit is &lt;9-200809051309" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033838" version="1" comment="libxml2-32bit is &lt;9-200809051312" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033839" version="1" comment="libxml2-64bit is &lt;9-200809051310" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031877" version="1" comment="libxml2-devel is &lt;2.6.7-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033840" version="1" comment="libxml2-x86 is &lt;9-200809051309" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031879" version="1" comment="libxml2 is &lt;2.6.7-28.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053391" version="1" comment="ruby is &lt;1.8.1-42.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033841" version="1" comment="jasper is &lt;1.701.0-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033842" version="1" comment="libjasper-32bit is &lt;9-200811141458" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031882" version="1" comment="libjasper-32bit is &lt;9-200811141502" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033843" version="1" comment="libjasper-64bit is &lt;9-200811141456" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033844" version="1" comment="libjasper-x86 is &lt;9-200811141502" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031883" version="1" comment="libjasper is &lt;1.701.0-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033845" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033846" version="1" comment="kernel-s390 is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031886" version="1" comment="kernel-source is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031887" version="1" comment="kernel-syms is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031884" version="1" comment="kernel-default is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033847" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033848" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033849" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031885" version="1" comment="kernel-smp is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033850" version="1" comment="kernel-xen is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033851" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033852" version="1" comment="kernel-s390x is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033853" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033854" version="1" comment="kernel-debug is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033855" version="1" comment="kernel-sn2 is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031888" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033856" version="1" comment="kernel-um is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033857" version="1" comment="kernel-xenpae is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033858" version="1" comment="um-host-install-initrd is &lt;1.0-48.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033859" version="1" comment="um-host-kernel is &lt;2.6.5-7.315" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031889" version="1" comment="cups-client is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031890" version="1" comment="cups-devel is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033860" version="1" comment="cups-libs-32bit is &lt;9-200810021505" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031891" version="1" comment="cups-libs-32bit is &lt;9-200810021549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033861" version="1" comment="cups-libs-64bit is &lt;9-200810021507" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033862" version="1" comment="cups-libs-x86 is &lt;9-200810021549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031892" version="1" comment="cups-libs is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031893" version="1" comment="cups is &lt;1.1.20-108.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031894" version="1" comment="cups-client is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031895" version="1" comment="cups-devel is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033863" version="1" comment="cups-libs-32bit is &lt;9-200812030148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031896" version="1" comment="cups-libs-32bit is &lt;9-200812030152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033864" version="1" comment="cups-libs-64bit is &lt;9-200812030148" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033865" version="1" comment="cups-libs-x86 is &lt;9-200812030152" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031897" version="1" comment="cups-libs is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031898" version="1" comment="cups is &lt;1.1.20-108.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031899" version="1" comment="ipsec-tools is &lt;0.3.3-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033866" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033867" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033868" version="1" comment="mod_php4-apache2 is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031900" version="1" comment="mod_php4-core is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033869" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031901" version="1" comment="php4-bcmath is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031902" version="1" comment="php4-bz2 is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031903" version="1" comment="php4-calendar is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031904" version="1" comment="php4-ctype is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031905" version="1" comment="php4-curl is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031906" version="1" comment="php4-dba is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031907" version="1" comment="php4-dbase is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031908" version="1" comment="php4-devel is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031909" version="1" comment="php4-domxml is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031910" version="1" comment="php4-exif is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031911" version="1" comment="php4-fastcgi is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031912" version="1" comment="php4-filepro is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031913" version="1" comment="php4-ftp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031914" version="1" comment="php4-gd is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031915" version="1" comment="php4-gettext is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031916" version="1" comment="php4-gmp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031917" version="1" comment="php4-iconv is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031918" version="1" comment="php4-imap is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031919" version="1" comment="php4-ldap is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031920" version="1" comment="php4-mbstring is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031921" version="1" comment="php4-mcal is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031922" version="1" comment="php4-mcrypt is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031923" version="1" comment="php4-mhash is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031924" version="1" comment="php4-mime_magic is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031925" version="1" comment="php4-mysql is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031926" version="1" comment="php4-pear is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031927" version="1" comment="php4-pgsql is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031928" version="1" comment="php4-qtdom is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031929" version="1" comment="php4-readline is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031930" version="1" comment="php4-recode is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031932" version="1" comment="php4-session is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031933" version="1" comment="php4-shmop is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031934" version="1" comment="php4-snmp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031935" version="1" comment="php4-sockets is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031936" version="1" comment="php4-swf is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031937" version="1" comment="php4-sysvsem is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031938" version="1" comment="php4-sysvshm is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031939" version="1" comment="php4-unixODBC is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031940" version="1" comment="php4-wddx is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031941" version="1" comment="php4-xslt is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031942" version="1" comment="php4-yp is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031943" version="1" comment="php4-zlib is &lt;4.3.4-43.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031945" version="1" comment="enscript is &lt;1.6.2-814.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031946" version="1" comment="ethereal is &lt;0.10.13-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031947" version="1" comment="mysql-Max is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031949" version="1" comment="mysql-client is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031950" version="1" comment="mysql-devel is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031951" version="1" comment="mysql-shared is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031952" version="1" comment="mysql is &lt;4.0.18-32.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031953" version="1" comment="openssh-askpass is &lt;4.1p1-11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031954" version="1" comment="openssh is &lt;4.1p1-11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033870" version="1" comment="libxml2-32bit is &lt;9-200811201349" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031955" version="1" comment="libxml2-32bit is &lt;9-200811201357" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033871" version="1" comment="libxml2-64bit is &lt;9-200811201351" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031956" version="1" comment="libxml2-devel is &lt;2.6.7-28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033872" version="1" comment="libxml2-x86 is &lt;9-200811201357" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031958" version="1" comment="libxml2 is &lt;2.6.7-28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033873" version="1" comment="libxml2-32bit is &lt;9-200811071618" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031959" version="1" comment="libxml2-32bit is &lt;9-200811071633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033874" version="1" comment="libxml2-64bit is &lt;9-200811071629" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031961" version="1" comment="libxml2-devel is &lt;2.6.7-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033875" version="1" comment="libxml2-x86 is &lt;9-200811071633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031960" version="1" comment="libxml2 is &lt;2.6.7-28.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033876" version="1" comment="net-snmp-32bit is &lt;9-200811201409" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031962" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031963" version="1" comment="net-snmp is &lt;5.1.3.1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031964" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031965" version="1" comment="km_ndiswrapper is &lt;1.1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054280" version="1" comment="mysql-Max is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054282" version="1" comment="mysql-client is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054283" version="1" comment="mysql-devel is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054284" version="1" comment="mysql-shared is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054285" version="1" comment="mysql is &lt;4.0.18-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031966" version="1" comment="nfs-utils is &lt;1.0.6-103.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031971" version="1" comment="yast2-backup is &lt;2.9.22-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033877" version="1" comment="python-32bit is &lt;9-200812011726" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031972" version="1" comment="python-32bit is &lt;9-200812011728" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033878" version="1" comment="python-64bit is &lt;9-200812011733" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031973" version="1" comment="python-curses is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031974" version="1" comment="python-demo is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031975" version="1" comment="python-devel is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031976" version="1" comment="python-doc-pdf is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031977" version="1" comment="python-doc is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031978" version="1" comment="python-gdbm is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031979" version="1" comment="python-idle is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031980" version="1" comment="python-mpz is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031981" version="1" comment="python-tk is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033879" version="1" comment="python-x86 is &lt;9-200812011728" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031982" version="1" comment="python-xml is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031983" version="1" comment="python is &lt;2.3.3-88.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033880" version="1" comment="clamav is &lt;0.94.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033881" version="1" comment="openssl-32bit is &lt;9-200901211332" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031985" version="1" comment="openssl-32bit is &lt;9-200901211340" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033882" version="1" comment="openssl-64bit is &lt;9-200901211338" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033883" version="1" comment="openssl-devel-32bit is &lt;9-200901211332" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031986" version="1" comment="openssl-devel-32bit is &lt;9-200901211340" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033884" version="1" comment="openssl-devel-64bit is &lt;9-200901211338" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031987" version="1" comment="openssl-devel is &lt;0.9.7d-15.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031988" version="1" comment="openssl-doc is &lt;0.9.7d-15.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033885" version="1" comment="openssl-x86 is &lt;9-200901211340" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031989" version="1" comment="openssl is &lt;0.9.7d-15.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031990" version="1" comment="enscript is &lt;1.6.2-814.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033886" version="1" comment="pam_mount-32bit is &lt;9-200901131807" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033887" version="1" comment="pam_mount-32bit is &lt;9-200901131814" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033888" version="1" comment="pam_mount-64bit is &lt;9-200901131809" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033889" version="1" comment="pam_mount is &lt;0.9.22-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033890" version="1" comment="clamav is &lt;0.94.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055088" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.144" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055089" version="1" comment="IBMJava2-JRE is &lt;1.4.2-0.146" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055090" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.144" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055091" version="1" comment="IBMJava2-SDK is &lt;1.4.2-0.146" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033891" version="1" comment="mozilla-calendar is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031992" version="1" comment="mozilla-cs is &lt;1.8_seamonkey_1.0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031993" version="1" comment="mozilla-deat is &lt;1.8_seamonkey_1.0.4-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031994" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031995" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031996" version="1" comment="mozilla-hu is &lt;1.80_seamonkey_1.0.4-11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031997" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009031999" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032000" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032001" version="1" comment="mozilla is &lt;1.8_seamonkey_1.0.9-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053722" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053723" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053724" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053725" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053726" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059267" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059268" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059269" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059270" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059271" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033892" version="1" comment="apache-mod_php4 is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033893" version="1" comment="apache2-mod_php4 is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033894" version="1" comment="mod_php4-apache2 is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033895" version="1" comment="mod_php4-core is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033896" version="1" comment="mod_php4-servlet is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033897" version="1" comment="php4-bcmath is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033898" version="1" comment="php4-bz2 is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033899" version="1" comment="php4-calendar is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033900" version="1" comment="php4-ctype is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033901" version="1" comment="php4-curl is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033902" version="1" comment="php4-dba is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033903" version="1" comment="php4-dbase is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033904" version="1" comment="php4-devel is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033905" version="1" comment="php4-domxml is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033906" version="1" comment="php4-exif is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033907" version="1" comment="php4-fastcgi is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033908" version="1" comment="php4-filepro is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033909" version="1" comment="php4-ftp is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033910" version="1" comment="php4-gd is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033911" version="1" comment="php4-gettext is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033912" version="1" comment="php4-gmp is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033913" version="1" comment="php4-iconv is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033914" version="1" comment="php4-imap is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033915" version="1" comment="php4-ldap is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033916" version="1" comment="php4-mbstring is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033917" version="1" comment="php4-mcal is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033918" version="1" comment="php4-mcrypt is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033919" version="1" comment="php4-mhash is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033920" version="1" comment="php4-mime_magic is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033921" version="1" comment="php4-mysql is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033922" version="1" comment="php4-pear is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033923" version="1" comment="php4-pgsql is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033924" version="1" comment="php4-qtdom is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033925" version="1" comment="php4-readline is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033926" version="1" comment="php4-recode is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033927" version="1" comment="php4-session is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033928" version="1" comment="php4-shmop is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033929" version="1" comment="php4-snmp is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033930" version="1" comment="php4-sockets is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033931" version="1" comment="php4-swf is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033932" version="1" comment="php4-sysvsem is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033933" version="1" comment="php4-sysvshm is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033934" version="1" comment="php4-unixODBC is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033935" version="1" comment="php4-wddx is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033936" version="1" comment="php4-xslt is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033937" version="1" comment="php4-yp is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033938" version="1" comment="php4-zlib is &lt;4.3.4-43.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033939" version="1" comment="audiofile-32bit is &lt;9-200901211327" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032004" version="1" comment="audiofile-32bit is &lt;9-200901211334" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033940" version="1" comment="audiofile-64bit is &lt;9-200901211430" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033941" version="1" comment="audiofile-x86 is &lt;9-200901211334" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032005" version="1" comment="audiofile is &lt;0.2.5-37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033942" version="1" comment="libpng-32bit is &lt;9-200901202353" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032006" version="1" comment="libpng-32bit is &lt;9-200901202355" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033943" version="1" comment="libpng-64bit is &lt;9-200901202353" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033944" version="1" comment="libpng-devel-64bit is &lt;9-200901202353" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032007" version="1" comment="libpng-devel is &lt;1.2.5-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033945" version="1" comment="libpng-x86 is &lt;9-200901202355" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032008" version="1" comment="libpng is &lt;1.2.5-182.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033946" version="1" comment="net-snmp-32bit is &lt;9-200906161409" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032009" version="1" comment="net-snmp-devel is &lt;5.1.3.1-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032010" version="1" comment="net-snmp is &lt;5.1.3.1-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032011" version="1" comment="perl-SNMP is &lt;5.1.3.1-0.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069808" version="1" comment="libpng-32bit is &lt;9-201108021633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069809" version="1" comment="libpng-32bit is &lt;9-201108021634" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069810" version="1" comment="libpng-64bit is &lt;9-201108021636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069811" version="1" comment="libpng-devel-64bit is &lt;9-201108021636" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069812" version="1" comment="libpng-devel is &lt;1.2.5-182.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069813" version="1" comment="libpng-x86 is &lt;9-201108021634" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069814" version="1" comment="libpng is &lt;1.2.5-182.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033947" version="1" comment="clamav is &lt;0.95-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064246" version="1" comment="mysql-Max is &lt;4.0.18-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064247" version="1" comment="mysql-client is &lt;4.0.18-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064248" version="1" comment="mysql-devel is &lt;4.0.18-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064249" version="1" comment="mysql-shared is &lt;4.0.18-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064250" version="1" comment="mysql is &lt;4.0.18-32.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032012" version="1" comment="xntp-doc is &lt;4.2.0a-23.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032013" version="1" comment="xntp is &lt;4.2.0a-23.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032014" version="1" comment="bind-devel is &lt;9.3.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033948" version="1" comment="bind-utils-32bit is &lt;9-200901120116" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032015" version="1" comment="bind-utils-32bit is &lt;9-200901120120" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033949" version="1" comment="bind-utils-64bit is &lt;9-200901120119" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033950" version="1" comment="bind-utils-x86 is &lt;9-200901120120" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032016" version="1" comment="bind-utils is &lt;9.3.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032017" version="1" comment="bind is &lt;9.3.4-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033951" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033952" version="1" comment="kernel-s390x is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032020" version="1" comment="kernel-source is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032021" version="1" comment="kernel-syms is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033953" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033954" version="1" comment="kernel-s390 is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032022" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033955" version="1" comment="kernel-debug is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032018" version="1" comment="kernel-default is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032019" version="1" comment="kernel-smp is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033956" version="1" comment="kernel-um is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033957" version="1" comment="kernel-xen is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033958" version="1" comment="kernel-xenpae is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033959" version="1" comment="um-host-install-initrd is &lt;1.0-48.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033960" version="1" comment="um-host-kernel is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033961" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033962" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033963" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033964" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033965" version="1" comment="kernel-sn2 is &lt;2.6.5-7.316" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033966" version="1" comment="curl-32bit is &lt;9-200902201553" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032023" version="1" comment="curl-32bit is &lt;9-200902201554" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032024" version="1" comment="curl-devel is &lt;7.11.0-39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032025" version="1" comment="curl is &lt;7.11.0-39.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033967" version="1" comment="libpng-32bit is &lt;9-200902171045" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032026" version="1" comment="libpng-32bit is &lt;9-200902171046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033968" version="1" comment="libpng-64bit is &lt;9-200902171045" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033969" version="1" comment="libpng-devel-64bit is &lt;9-200902171045" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032027" version="1" comment="libpng-devel is &lt;1.2.5-182.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033970" version="1" comment="libpng-x86 is &lt;9-200902171046" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032028" version="1" comment="libpng is &lt;1.2.5-182.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033971" version="1" comment="libpng-32bit is &lt;9-200902251713" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032029" version="1" comment="libpng-32bit is &lt;9-200902251715" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033972" version="1" comment="libpng-64bit is &lt;9-200902251712" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033973" version="1" comment="libpng-devel-64bit is &lt;9-200902251712" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032030" version="1" comment="libpng-devel is &lt;1.2.5-182.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033974" version="1" comment="libpng-x86 is &lt;9-200902251715" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032031" version="1" comment="libpng is &lt;1.2.5-182.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032033" version="1" comment="multipath-tools is &lt;0.4.7-75.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032034" version="1" comment="cups-client is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032035" version="1" comment="cups-devel is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032036" version="1" comment="cups-libs-32bit is &lt;9-200904161449" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033975" version="1" comment="cups-libs-32bit is &lt;9-200904161506" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033976" version="1" comment="cups-libs-64bit is &lt;9-200904161924" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033977" version="1" comment="cups-libs-x86 is &lt;9-200904161449" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032037" version="1" comment="cups-libs is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032038" version="1" comment="cups is &lt;1.1.20-108.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032039" version="1" comment="xntp-doc is &lt;4.2.0a-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032040" version="1" comment="xntp is &lt;4.2.0a-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033978" version="1" comment="liblcms-32bit is &lt;9-200903091204" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032046" version="1" comment="liblcms-32bit is &lt;9-200903091206" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033979" version="1" comment="liblcms-64bit is &lt;9-200903091206" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032047" version="1" comment="liblcms-devel is &lt;1.12-55.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033980" version="1" comment="liblcms-x86 is &lt;9-200903091206" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032048" version="1" comment="liblcms is &lt;1.12-55.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032052" version="1" comment="ghostscript-fonts-other is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032053" version="1" comment="ghostscript-fonts-rus is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032054" version="1" comment="ghostscript-fonts-std is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032055" version="1" comment="ghostscript-library is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032056" version="1" comment="ghostscript-serv is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032057" version="1" comment="ghostscript-x11 is &lt;7.07.1rc1-195.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032058" version="1" comment="libgimpprint-devel is &lt;4.2.6-46.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032059" version="1" comment="libgimpprint is &lt;4.2.6-46.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032062" version="1" comment="libsoup-devel is &lt;2.2.3-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032063" version="1" comment="libsoup is &lt;2.2.3-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032064" version="1" comment="openssl-32bit is &lt;9-200904151544" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033981" version="1" comment="openssl-32bit is &lt;9-200904151549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033982" version="1" comment="openssl-64bit is &lt;9-200904151553" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032065" version="1" comment="openssl-devel-32bit is &lt;9-200904151544" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033983" version="1" comment="openssl-devel-32bit is &lt;9-200904151549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033984" version="1" comment="openssl-devel-64bit is &lt;9-200904151553" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032066" version="1" comment="openssl-devel is &lt;0.9.7d-15.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032067" version="1" comment="openssl-doc is &lt;0.9.7d-15.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033985" version="1" comment="openssl-x86 is &lt;9-200904151544" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032068" version="1" comment="openssl is &lt;0.9.7d-15.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033986" version="1" comment="cyrus-sasl-32bit is &lt;9-200905141643" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032069" version="1" comment="cyrus-sasl-32bit is &lt;9-200905141649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033987" version="1" comment="cyrus-sasl-64bit is &lt;9-200905141648" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032070" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033988" version="1" comment="cyrus-sasl-devel-32bit is &lt;9-200905141643" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032071" version="1" comment="cyrus-sasl-devel-32bit is &lt;9-200905141649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033989" version="1" comment="cyrus-sasl-devel-64bit is &lt;9-200905141648" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032072" version="1" comment="cyrus-sasl-devel is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032073" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032074" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032075" version="1" comment="cyrus-sasl-otp is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032076" version="1" comment="cyrus-sasl-plain is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033990" version="1" comment="cyrus-sasl-x86 is &lt;9-200905141649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032077" version="1" comment="cyrus-sasl is &lt;2.1.18-33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060689" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060690" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060691" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060692" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060693" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060694" version="1" comment="mozilla is &lt;1.8_seamonkey_1.1.19-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056882" version="1" comment="kdelibs3-32bit is &lt;9-200912160015" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056898" version="1" comment="kdelibs3-32bit is &lt;9-200912160022" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056899" version="1" comment="kdelibs3-64bit is &lt;9-200912160050" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056883" version="1" comment="kdelibs3-devel-doc is &lt;3.2.1-44.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056884" version="1" comment="kdelibs3-devel is &lt;3.2.1-44.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056900" version="1" comment="kdelibs3-x86 is &lt;9-200912160015" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056885" version="1" comment="kdelibs3 is &lt;3.2.1-44.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053392" version="1" comment="dhcp-client is &lt;3.0.1rc13-28.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053616" version="1" comment="bind-devel is &lt;9.3.4-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053617" version="1" comment="bind-utils-32bit is &lt;9-200907291720" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053629" version="1" comment="bind-utils-64bit is &lt;9-200907291723" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053630" version="1" comment="bind-utils-x86 is &lt;9-200907291720" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053618" version="1" comment="bind-utils is &lt;9.3.4-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053619" version="1" comment="bind is &lt;9.3.4-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032078" version="1" comment="cups-client is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032079" version="1" comment="cups-devel is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033991" version="1" comment="cups-libs-32bit is &lt;9-200906022330" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032080" version="1" comment="cups-libs-32bit is &lt;9-200906022331" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033992" version="1" comment="cups-libs-64bit is &lt;9-200906022331" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033993" version="1" comment="cups-libs-x86 is &lt;9-200906022331" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032081" version="1" comment="cups-libs is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032082" version="1" comment="cups is &lt;1.1.20-108.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033994" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033995" version="1" comment="kernel-s390 is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032085" version="1" comment="kernel-source is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032086" version="1" comment="kernel-syms is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033996" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033997" version="1" comment="kernel-s390x is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032083" version="1" comment="kernel-default is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033998" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033999" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034000" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032084" version="1" comment="kernel-smp is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032087" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034001" version="1" comment="kernel-debug is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034002" version="1" comment="kernel-um is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034003" version="1" comment="kernel-xen is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034004" version="1" comment="kernel-xenpae is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034005" version="1" comment="um-host-install-initrd is &lt;1.0-48.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034006" version="1" comment="um-host-kernel is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034007" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034008" version="1" comment="kernel-sn2 is &lt;2.6.5-7.317" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032088" version="1" comment="postgresql-contrib is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032089" version="1" comment="postgresql-devel is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032090" version="1" comment="postgresql-docs is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034009" version="1" comment="postgresql-libs-32bit is &lt;9-200903241519" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032091" version="1" comment="postgresql-libs-32bit is &lt;9-200903241522" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034010" version="1" comment="postgresql-libs-64bit is &lt;9-200903241530" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034011" version="1" comment="postgresql-libs-x86 is &lt;9-200903241522" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032092" version="1" comment="postgresql-libs is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032093" version="1" comment="postgresql-server is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032094" version="1" comment="postgresql is &lt;7.4.25-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032095" version="1" comment="freetype2-32bit is &lt;9-200904162346" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034012" version="1" comment="freetype2-32bit is &lt;9-200904170004" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034013" version="1" comment="freetype2-64bit is &lt;9-200904170054" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032096" version="1" comment="freetype2-devel-32bit is &lt;9-200904162346" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034014" version="1" comment="freetype2-devel-32bit is &lt;9-200904170004" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034015" version="1" comment="freetype2-devel-64bit is &lt;9-200904170054" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032097" version="1" comment="freetype2-devel is &lt;2.1.7-53.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034016" version="1" comment="freetype2-x86 is &lt;9-200904162346" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032098" version="1" comment="freetype2 is &lt;2.1.7-53.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034017" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034018" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056372" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056373" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.2-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056221" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056222" version="1" comment="kernel-s390 is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056219" version="1" comment="kernel-source is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056220" version="1" comment="kernel-syms is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056223" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056224" version="1" comment="kernel-debug is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056217" version="1" comment="kernel-default is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056218" version="1" comment="kernel-smp is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056225" version="1" comment="kernel-um is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056226" version="1" comment="kernel-xen is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056227" version="1" comment="kernel-xenpae is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056228" version="1" comment="um-host-install-initrd is &lt;1.0-48.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056229" version="1" comment="um-host-kernel is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056230" version="1" comment="xen-kmp is &lt;3.0.4_2.6.5_7.321-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056231" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056232" version="1" comment="kernel-sn2 is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056233" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056234" version="1" comment="kernel-s390x is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056235" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056236" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056237" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057914" version="1" comment="pango-32bit is &lt;9-201001271537" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057915" version="1" comment="pango-32bit is &lt;9-201001271539" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057916" version="1" comment="pango-64bit is &lt;9-201001271549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057917" version="1" comment="pango-devel-64bit is &lt;9-201001271549" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057918" version="1" comment="pango-devel is &lt;1.2.5-174.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057919" version="1" comment="pango-doc is &lt;1.2.5-174.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057920" version="1" comment="pango-x86 is &lt;9-201001271537" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057921" version="1" comment="pango is &lt;1.2.5-174.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034019" version="1" comment="ethereal is &lt;0.10.13-2.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055123" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055124" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055125" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055126" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055127" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055128" version="1" comment="mozilla is &lt;1.8_seamonkey_1.1.17-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057997" version="1" comment="kernel-default is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057998" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057999" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058000" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058001" version="1" comment="kernel-smp is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058002" version="1" comment="kernel-source is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058003" version="1" comment="kernel-syms is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058004" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058005" version="1" comment="kernel-debug is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058006" version="1" comment="kernel-um is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058007" version="1" comment="kernel-xen is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058008" version="1" comment="kernel-xenpae is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058009" version="1" comment="um-host-install-initrd is &lt;1.0-48.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058010" version="1" comment="um-host-kernel is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058011" version="1" comment="xen-kmp is &lt;3.0.4_2.6.5_7.322-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058012" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058013" version="1" comment="kernel-s390 is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058014" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058015" version="1" comment="kernel-s390x is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058016" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058017" version="1" comment="kernel-sn2 is &lt;2.6.5-7.322" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054246" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054247" version="1" comment="kernel-s390 is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054244" version="1" comment="kernel-source is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054245" version="1" comment="kernel-syms is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054242" version="1" comment="kernel-default is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054243" version="1" comment="kernel-smp is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054248" version="1" comment="kernel-xen is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054249" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054250" version="1" comment="kernel-debug is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054251" version="1" comment="kernel-sn2 is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054252" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054253" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054254" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054255" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054256" version="1" comment="kernel-s390x is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054257" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054258" version="1" comment="kernel-um is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054259" version="1" comment="kernel-xenpae is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054260" version="1" comment="um-host-install-initrd is &lt;1.0-48.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054261" version="1" comment="um-host-kernel is &lt;2.6.5-7.318" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009034020" version="1" comment="quagga is &lt;0.99.7-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032102" version="1" comment="ipsec-tools is &lt;0.3.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055712" version="1" comment="apache2-devel is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055713" version="1" comment="apache2-doc is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055714" version="1" comment="apache2-example-pages is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055715" version="1" comment="apache2-prefork is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055716" version="1" comment="apache2-worker is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055717" version="1" comment="apache2 is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055705" version="1" comment="libapr0 is &lt;2.0.59-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060052" version="1" comment="apache2-devel is &lt;2.0.59-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060053" version="1" comment="apache2-doc is &lt;2.0.59-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060054" version="1" comment="apache2-example-pages is &lt;2.0.59-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060055" version="1" comment="apache2-prefork is &lt;2.0.59-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060056" version="1" comment="apache2-worker is &lt;2.0.59-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060057" version="1" comment="apache2 is &lt;2.0.59-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060058" version="1" comment="libapr0 is &lt;2.0.59-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053352" version="1" comment="libpng-32bit is &lt;9-200906232031" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053358" version="1" comment="libpng-32bit is &lt;9-200906232032" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053359" version="1" comment="libpng-64bit is &lt;9-200906232029" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053360" version="1" comment="libpng-devel-64bit is &lt;9-200906232029" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053353" version="1" comment="libpng-devel is &lt;1.2.5-182.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053361" version="1" comment="libpng-x86 is &lt;9-200906232031" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053354" version="1" comment="libpng is &lt;1.2.5-182.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053444" version="1" comment="freeswan is &lt;2.04_1.5.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053717" version="1" comment="libtiff-32bit is &lt;9-200904061139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053727" version="1" comment="libtiff-32bit is &lt;9-200904061900" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053728" version="1" comment="libtiff-64bit is &lt;9-200904061620" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053729" version="1" comment="libtiff-x86 is &lt;9-200904061139" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053718" version="1" comment="libtiff is &lt;3.6.1-38.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054047" version="1" comment="libtiff-32bit is &lt;9-200908071506" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054053" version="1" comment="libtiff-64bit is &lt;9-200908071517" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054054" version="1" comment="libtiff-x86 is &lt;9-200908071506" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054048" version="1" comment="libtiff is &lt;3.6.1-38.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055386" version="1" comment="mozilla-devel is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055387" version="1" comment="mozilla-dom-inspector is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055388" version="1" comment="mozilla-irc is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055389" version="1" comment="mozilla-mail is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055390" version="1" comment="mozilla-venkman is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055391" version="1" comment="mozilla is &lt;1.8_seamonkey_1.1.18-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054892" version="1" comment="openldap2-back-ldap is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054893" version="1" comment="openldap2-back-meta is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054894" version="1" comment="openldap2-back-monitor is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054895" version="1" comment="openldap2-back-perl is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054896" version="1" comment="openldap2-client-32bit is &lt;9-200909091106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054912" version="1" comment="openldap2-client-32bit is &lt;9-200909091129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054913" version="1" comment="openldap2-client-64bit is &lt;9-200909091107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054914" version="1" comment="openldap2-client-x86 is &lt;9-200909091106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054897" version="1" comment="openldap2-client is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054898" version="1" comment="openldap2-devel-32bit is &lt;9-200909091106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054915" version="1" comment="openldap2-devel-32bit is &lt;9-200909091129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054916" version="1" comment="openldap2-devel-64bit is &lt;9-200909091107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054899" version="1" comment="openldap2-devel is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054900" version="1" comment="openldap2 is &lt;2.2.24-4.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054901" version="1" comment="mutt is &lt;1.5.6i-64.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054814" version="1" comment="libxml-32bit is &lt;9-200909081613" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054810" version="1" comment="libxml-32bit is &lt;9-200909081614" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054815" version="1" comment="libxml-64bit is &lt;9-200909081614" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054811" version="1" comment="libxml-devel is &lt;1.8.17-366.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054816" version="1" comment="libxml-x86 is &lt;9-200909081614" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054812" version="1" comment="libxml is &lt;1.8.17-366.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053785" version="1" comment="libxml2-32bit is &lt;9-200908071404" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053774" version="1" comment="libxml2-32bit is &lt;9-200908071409" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053786" version="1" comment="libxml2-64bit is &lt;9-200908071407" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053775" version="1" comment="libxml2-devel is &lt;2.6.7-28.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053787" version="1" comment="libxml2-x86 is &lt;9-200908071409" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053776" version="1" comment="libxml2 is &lt;2.6.7-28.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053906" version="1" comment="curl-32bit is &lt;9-200908071403" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053893" version="1" comment="curl-32bit is &lt;9-200908071408" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053894" version="1" comment="curl-devel is &lt;7.11.0-39.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053895" version="1" comment="curl is &lt;7.11.0-39.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056992" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056993" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056994" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056995" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056418" version="1" comment="ethereal is &lt;0.10.13-2.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054499" version="1" comment="ethereal is &lt;0.10.13-2.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058845" version="1" comment="ethereal is &lt;0.10.13-2.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059036" version="1" comment="squid is &lt;2.5.STABLE5-42.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060340" version="1" comment="python-32bit is &lt;9-201003231321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060341" version="1" comment="python-32bit is &lt;9-201003231557" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060342" version="1" comment="python-64bit is &lt;9-201003232314" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060343" version="1" comment="python-curses is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060344" version="1" comment="python-demo is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060345" version="1" comment="python-devel is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060346" version="1" comment="python-doc-pdf is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060347" version="1" comment="python-doc is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060348" version="1" comment="python-gdbm is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060349" version="1" comment="python-idle is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060350" version="1" comment="python-mpz is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060351" version="1" comment="python-tk is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060352" version="1" comment="python-x86 is &lt;9-201003231321" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060353" version="1" comment="python-xml is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060354" version="1" comment="python is &lt;2.3.3-88.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054394" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054395" version="1" comment="IBMJava5-JRE is &lt;1.5.0-0.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054396" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054397" version="1" comment="IBMJava5-SDK is &lt;1.5.0-0.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060885" version="1" comment="xmlrpc-c-devel is &lt;0.9.10-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060886" version="1" comment="xmlrpc-c is &lt;0.9.10-21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064556" version="1" comment="cyrus-imapd-devel is &lt;2.2.3-83.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064557" version="1" comment="cyrus-imapd is &lt;2.2.3-83.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064554" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.3-83.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064555" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.3-83.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055011" version="1" comment="freeswan is &lt;2.04_1.5.4-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061094" version="1" comment="libvorbis-32bit is &lt;9-201005281006" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061095" version="1" comment="libvorbis-32bit is &lt;9-201005281010" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061096" version="1" comment="libvorbis-64bit is &lt;9-201005281008" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061097" version="1" comment="libvorbis-devel is &lt;1.0.1-56.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061098" version="1" comment="libvorbis-x86 is &lt;9-201005281010" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061099" version="1" comment="libvorbis is &lt;1.0.1-56.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053777" version="1" comment="fetchmail is &lt;6.2.5-49.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053778" version="1" comment="fetchmailconf is &lt;6.2.5-49.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054428" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054429" version="1" comment="kernel-debug is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054423" version="1" comment="kernel-default is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054430" version="1" comment="kernel-sn2 is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054425" version="1" comment="kernel-source is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054426" version="1" comment="kernel-syms is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054424" version="1" comment="kernel-smp is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054431" version="1" comment="kernel-xen is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054432" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054433" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054434" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054435" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054436" version="1" comment="kernel-s390x is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054437" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054438" version="1" comment="kernel-s390 is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054427" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054439" version="1" comment="kernel-um is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054440" version="1" comment="kernel-xenpae is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054441" version="1" comment="um-host-install-initrd is &lt;1.0-48.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054442" version="1" comment="um-host-kernel is &lt;2.6.5-7.319" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054779" version="1" comment="gnutls-devel is &lt;1.0.8-26.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054780" version="1" comment="gnutls is &lt;1.0.8-26.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055501" version="1" comment="libsmbclient-32bit is &lt;9-200910020932" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055460" version="1" comment="libsmbclient-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055502" version="1" comment="libsmbclient-64bit is &lt;9-200910020935" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055461" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055462" version="1" comment="libsmbclient is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055503" version="1" comment="samba-32bit is &lt;9-200910020932" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055463" version="1" comment="samba-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055504" version="1" comment="samba-client-32bit is &lt;9-200910020932" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055464" version="1" comment="samba-client-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055465" version="1" comment="samba-client is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055466" version="1" comment="samba-doc is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055467" version="1" comment="samba-pdb is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055468" version="1" comment="samba-python is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055469" version="1" comment="samba-vscan is &lt;0.3.6b-0.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055505" version="1" comment="samba-winbind-32bit is &lt;9-200910020932" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055470" version="1" comment="samba-winbind-32bit is &lt;9-200910020934" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055471" version="1" comment="samba-winbind is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055472" version="1" comment="samba is &lt;3.0.26a-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055108" version="1" comment="freeradius-devel is &lt;1.0.5-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055109" version="1" comment="freeradius is &lt;1.0.5-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055012" version="1" comment="postgresql-contrib is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055013" version="1" comment="postgresql-devel is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055014" version="1" comment="postgresql-docs is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055015" version="1" comment="postgresql-libs-32bit is &lt;9-200909210011" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055027" version="1" comment="postgresql-libs-32bit is &lt;9-200909210145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055028" version="1" comment="postgresql-libs-64bit is &lt;9-200909210409" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055029" version="1" comment="postgresql-libs-x86 is &lt;9-200909210011" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055016" version="1" comment="postgresql-libs is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055017" version="1" comment="postgresql-pl is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055018" version="1" comment="postgresql-server is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055019" version="1" comment="postgresql is &lt;7.4.26-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055779" version="1" comment="cyrus-imapd-devel is &lt;2.2.3-83.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055780" version="1" comment="cyrus-imapd is &lt;2.2.3-83.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055770" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.3-83.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055771" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.3-83.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059253" version="1" comment="openssl-32bit is &lt;9-201003291534" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059254" version="1" comment="openssl-32bit is &lt;9-201003291538" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059255" version="1" comment="openssl-64bit is &lt;9-201003291547" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059256" version="1" comment="openssl-devel-32bit is &lt;9-201003291534" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059257" version="1" comment="openssl-devel-32bit is &lt;9-201003291538" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059258" version="1" comment="openssl-devel-64bit is &lt;9-201003291547" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059259" version="1" comment="openssl-devel is &lt;0.9.7d-15.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059260" version="1" comment="openssl-doc is &lt;0.9.7d-15.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059261" version="1" comment="openssl-x86 is &lt;9-201003291534" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059262" version="1" comment="openssl is &lt;0.9.7d-15.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056987" version="1" comment="cups-client is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056988" version="1" comment="cups-devel is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056989" version="1" comment="cups-libs-32bit is &lt;9-200912011928" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056996" version="1" comment="cups-libs-32bit is &lt;9-200912020056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056997" version="1" comment="cups-libs-64bit is &lt;9-200912020435" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056998" version="1" comment="cups-libs-x86 is &lt;9-200912011928" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056990" version="1" comment="cups-libs is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056991" version="1" comment="cups is &lt;1.1.20-108.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067910" version="1" comment="gnutls-devel is &lt;1.0.8-26.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067911" version="1" comment="gnutls is &lt;1.0.8-26.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060828" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060829" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060830" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060831" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065193" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065194" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.6-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061139" version="1" comment="IBMJava5-JRE is &lt;1.5.0_sr11.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061140" version="1" comment="IBMJava5-JRE is &lt;1.5.0_sr11.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061141" version="1" comment="IBMJava5-SDK is &lt;1.5.0_sr11.2-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061142" version="1" comment="IBMJava5-SDK is &lt;1.5.0_sr11.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056281" version="1" comment="openssl-32bit is &lt;9-200911130941" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056276" version="1" comment="openssl-32bit is &lt;9-200911130943" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056282" version="1" comment="openssl-64bit is &lt;9-200911130948" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056283" version="1" comment="openssl-devel-32bit is &lt;9-200911130941" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056277" version="1" comment="openssl-devel-32bit is &lt;9-200911130943" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056284" version="1" comment="openssl-devel-64bit is &lt;9-200911130948" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056278" version="1" comment="openssl-devel is &lt;0.9.7d-15.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056279" version="1" comment="openssl-doc is &lt;0.9.7d-15.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056285" version="1" comment="openssl-x86 is &lt;9-200911130943" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056280" version="1" comment="openssl is &lt;0.9.7d-15.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064558" version="1" comment="IBMJava5-JRE is &lt;1.5.0_sr12.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064559" version="1" comment="IBMJava5-SDK is &lt;1.5.0_sr12.2-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057198" version="1" comment="expat-32bit is &lt;9-201001081624" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057204" version="1" comment="expat-32bit is &lt;9-201001081626" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057205" version="1" comment="expat-64bit is &lt;9-201001081641" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057206" version="1" comment="expat-x86 is &lt;9-201001081624" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057199" version="1" comment="expat is &lt;1.95.7-37.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056825" version="1" comment="expat-32bit is &lt;9-200912070059" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056831" version="1" comment="expat-32bit is &lt;9-200912070100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056832" version="1" comment="expat-64bit is &lt;9-200912070059" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056833" version="1" comment="expat-x86 is &lt;9-200912070059" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056826" version="1" comment="expat is &lt;1.95.7-37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056878" version="1" comment="xntp-doc is &lt;4.2.0a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056879" version="1" comment="xntp is &lt;4.2.0a-23.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056331" version="1" comment="expat-32bit is &lt;9-200910300946" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056322" version="1" comment="expat-32bit is &lt;9-200910300949" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056332" version="1" comment="expat-64bit is &lt;9-200910300949" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056333" version="1" comment="expat-x86 is &lt;9-200910300949" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056323" version="1" comment="expat is &lt;1.95.7-37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058470" version="1" comment="libtool-32bit is &lt;9-200912011710" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058468" version="1" comment="libtool-32bit is &lt;9-200912011711" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058471" version="1" comment="libtool-64bit is &lt;9-200912011715" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058472" version="1" comment="libtool-x86 is &lt;9-200912011711" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058469" version="1" comment="libtool is &lt;1.5.2-56.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057172" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057173" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057268" version="1" comment="postgresql-contrib is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057269" version="1" comment="postgresql-devel is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057270" version="1" comment="postgresql-docs is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057271" version="1" comment="postgresql-libs-32bit is &lt;9-201001081716" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057283" version="1" comment="postgresql-libs-32bit is &lt;9-201001081942" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057284" version="1" comment="postgresql-libs-64bit is &lt;9-201001082242" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057285" version="1" comment="postgresql-libs-x86 is &lt;9-201001081716" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057272" version="1" comment="postgresql-libs is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057273" version="1" comment="postgresql-pl is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057274" version="1" comment="postgresql-server is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057275" version="1" comment="postgresql is &lt;7.4.27-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058589" version="1" comment="libnetpbm is &lt;1.0.0-618.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058590" version="1" comment="netpbm is &lt;10.11.4-172.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058488" version="1" comment="sendmail-devel is &lt;8.12.11-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058489" version="1" comment="sendmail is &lt;8.12.11-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058490" version="1" comment="uucp is &lt;1.07-225.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057425" version="1" comment="gzip is &lt;1.3.5-136.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059964" version="1" comment="apache-devel is &lt;1.3.29-71.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059965" version="1" comment="apache-doc is &lt;1.3.29-71.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059966" version="1" comment="apache-example-pages is &lt;1.3.29-71.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059967" version="1" comment="apache is &lt;1.3.29-71.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059968" version="1" comment="mod_ssl is &lt;2.8.16-71.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062170" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062171" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.5-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059969" version="1" comment="clamav is &lt;0.96-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060266" version="1" comment="libpng-32bit is &lt;9-201003180213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060267" version="1" comment="libpng-32bit is &lt;9-201003180217" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060268" version="1" comment="libpng-64bit is &lt;9-201003180220" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060269" version="1" comment="libpng-devel-64bit is &lt;9-201003180220" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060270" version="1" comment="libpng-devel is &lt;1.2.5-182.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060271" version="1" comment="libpng-x86 is &lt;9-201003180213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060272" version="1" comment="libpng is &lt;1.2.5-182.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062066" version="1" comment="openldap2-back-ldap is &lt;2.2.24-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062067" version="1" comment="openldap2-back-meta is &lt;2.2.24-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062068" version="1" comment="openldap2-back-monitor is &lt;2.2.24-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062069" version="1" comment="openldap2-back-perl is &lt;2.2.24-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062070" version="1" comment="openldap2-client-32bit is &lt;9-201006301103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062071" version="1" comment="openldap2-client-32bit is &lt;9-201006301111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062072" version="1" comment="openldap2-client-64bit is &lt;9-201006301115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062073" version="1" comment="openldap2-client-x86 is &lt;9-201006301103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062074" version="1" comment="openldap2-client is &lt;2.2.24-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062075" version="1" comment="openldap2-devel-32bit is &lt;9-201006301103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062076" version="1" comment="openldap2-devel-32bit is &lt;9-201006301111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062077" version="1" comment="openldap2-devel-64bit is &lt;9-201006301115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062078" version="1" comment="openldap2-devel is &lt;2.2.24-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062079" version="1" comment="openldap2 is &lt;2.2.24-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063189" version="1" comment="bzip2-32bit is &lt;9-201009152108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063190" version="1" comment="bzip2-32bit is &lt;9-201009152109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063191" version="1" comment="bzip2-64bit is &lt;9-201009152111" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063192" version="1" comment="bzip2-x86 is &lt;9-201009152108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063193" version="1" comment="bzip2 is &lt;1.0.2-346.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060646" version="1" comment="pango-32bit is &lt;9-201004301253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060647" version="1" comment="pango-32bit is &lt;9-201004301254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060648" version="1" comment="pango-64bit is &lt;9-201004301300" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060649" version="1" comment="pango-devel-64bit is &lt;9-201004301300" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060650" version="1" comment="pango-devel is &lt;1.2.5-174.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060651" version="1" comment="pango-doc is &lt;1.2.5-174.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060652" version="1" comment="pango-x86 is &lt;9-201004301254" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060653" version="1" comment="pango is &lt;1.2.5-174.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064781" version="1" comment="cups-client is &lt;1.1.20-108.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064782" version="1" comment="cups-devel is &lt;1.1.20-108.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064783" version="1" comment="cups-libs-32bit is &lt;9-201010271353" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064784" version="1" comment="cups-libs-64bit is &lt;9-201010271353" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064785" version="1" comment="cups-libs-x86 is &lt;9-201010271353" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064786" version="1" comment="cups-libs is &lt;1.1.20-108.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064787" version="1" comment="cups is &lt;1.1.20-108.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059272" version="1" comment="libsmbclient-32bit is &lt;9-201003120118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059273" version="1" comment="libsmbclient-64bit is &lt;9-201003120132" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059274" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059275" version="1" comment="libsmbclient is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059276" version="1" comment="samba-32bit is &lt;9-201003120118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059277" version="1" comment="samba-client-32bit is &lt;9-201003120118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059278" version="1" comment="samba-client is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059279" version="1" comment="samba-doc is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059280" version="1" comment="samba-pdb is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059281" version="1" comment="samba-python is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059282" version="1" comment="samba-vscan is &lt;0.3.6b-0.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059283" version="1" comment="samba-winbind-32bit is &lt;9-201003120118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059284" version="1" comment="samba-winbind is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059285" version="1" comment="samba is &lt;3.0.26a-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060059" version="1" comment="cpio is &lt;2.6-70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060022" version="1" comment="tar is &lt;1.13.25-325.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060899" version="1" comment="gnutls-devel is &lt;1.0.8-26.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060900" version="1" comment="gnutls is &lt;1.0.8-26.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062644" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062645" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062646" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062647" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062648" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061155" version="1" comment="XFree86-Mesa-32bit is &lt;9-201004201452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061156" version="1" comment="XFree86-Mesa-32bit is &lt;9-201004201540" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061157" version="1" comment="XFree86-Mesa-64bit is &lt;9-201004201543" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061158" version="1" comment="XFree86-Mesa-devel-32bit is &lt;9-201004201452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061159" version="1" comment="XFree86-Mesa-devel-32bit is &lt;9-201004201540" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061160" version="1" comment="XFree86-Mesa-devel-64bit is &lt;9-201004201543" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061161" version="1" comment="XFree86-Mesa-devel is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061162" version="1" comment="XFree86-Mesa-x86 is &lt;9-201004201452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061163" version="1" comment="XFree86-Mesa is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061164" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061165" version="1" comment="XFree86-Xprt is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061166" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061167" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061168" version="1" comment="XFree86-devel-32bit is &lt;9-201004201452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061169" version="1" comment="XFree86-devel-32bit is &lt;9-201004201540" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061170" version="1" comment="XFree86-devel-64bit is &lt;9-201004201543" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061171" version="1" comment="XFree86-devel is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061172" version="1" comment="XFree86-doc is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061173" version="1" comment="XFree86-driver-options is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061174" version="1" comment="XFree86-fonts-100dpi is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061175" version="1" comment="XFree86-fonts-75dpi is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061176" version="1" comment="XFree86-fonts-cyrillic is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061177" version="1" comment="XFree86-fonts-scalable is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061178" version="1" comment="XFree86-fonts-syriac is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061179" version="1" comment="XFree86-libs-32bit is &lt;9-201004201452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061180" version="1" comment="XFree86-libs-32bit is &lt;9-201004201540" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061181" version="1" comment="XFree86-libs-64bit is &lt;9-201004201543" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061182" version="1" comment="XFree86-libs-x86 is &lt;9-201004201452" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061183" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061184" version="1" comment="XFree86-man is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061185" version="1" comment="XFree86-server-glx is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061186" version="1" comment="XFree86-server is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061187" version="1" comment="XFree86 is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061188" version="1" comment="km_drm is &lt;4.3.99.902-43.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063327" version="1" comment="XFree86-server-glx is &lt;4.3.99.902-43.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063328" version="1" comment="XFree86-server is &lt;4.3.99.902-43.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062043" version="1" comment="perl-32bit is &lt;9-201007292356" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062044" version="1" comment="perl-32bit is &lt;9-201007300002" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062045" version="1" comment="perl-64bit is &lt;9-201007300007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062046" version="1" comment="perl-x86 is &lt;9-201007292356" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062047" version="1" comment="perl is &lt;5.8.3-32.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062286" version="1" comment="libpng-32bit is &lt;9-201009011027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062287" version="1" comment="libpng-32bit is &lt;9-201009011028" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062288" version="1" comment="libpng-64bit is &lt;9-201009011033" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062289" version="1" comment="libpng-devel-64bit is &lt;9-201009011033" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062290" version="1" comment="libpng-devel is &lt;1.2.5-182.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062291" version="1" comment="libpng-x86 is &lt;9-201009011027" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062292" version="1" comment="libpng is &lt;1.2.5-182.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065614" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065615" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065616" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.8-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065617" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.8-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066022" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066023" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060850" version="1" comment="libtiff-32bit is &lt;9-201005251428" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060851" version="1" comment="libtiff-32bit is &lt;9-201005251430" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060852" version="1" comment="libtiff-64bit is &lt;9-201005251431" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060853" version="1" comment="libtiff-x86 is &lt;9-201005251428" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060854" version="1" comment="libtiff is &lt;3.6.1-38.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061755" version="1" comment="clamav is &lt;0.96.1-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066673" version="1" comment="quagga is &lt;0.99.7-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062133" version="1" comment="freetype2-32bit is &lt;9-201008121257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062134" version="1" comment="freetype2-32bit is &lt;9-201008121259" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062135" version="1" comment="freetype2-64bit is &lt;9-201008121302" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062136" version="1" comment="freetype2-devel-32bit is &lt;9-201008121257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062137" version="1" comment="freetype2-devel-32bit is &lt;9-201008121259" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062138" version="1" comment="freetype2-devel-64bit is &lt;9-201008121302" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062139" version="1" comment="freetype2-devel is &lt;2.1.7-53.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062140" version="1" comment="freetype2-x86 is &lt;9-201008121257" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062141" version="1" comment="freetype2 is &lt;2.1.7-53.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060925" version="1" comment="libsmbclient-32bit is &lt;9-201006132231" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060926" version="1" comment="libsmbclient-32bit is &lt;9-201006132232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060927" version="1" comment="libsmbclient-64bit is &lt;9-201006132237" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060928" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060929" version="1" comment="libsmbclient is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060930" version="1" comment="samba-32bit is &lt;9-201006132231" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060931" version="1" comment="samba-32bit is &lt;9-201006132232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060932" version="1" comment="samba-client-32bit is &lt;9-201006132231" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060933" version="1" comment="samba-client-32bit is &lt;9-201006132232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060934" version="1" comment="samba-client is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060935" version="1" comment="samba-doc is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060936" version="1" comment="samba-pdb is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060937" version="1" comment="samba-python is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060938" version="1" comment="samba-vscan is &lt;0.3.6b-0.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060939" version="1" comment="samba-winbind-32bit is &lt;9-201006132231" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060940" version="1" comment="samba-winbind-32bit is &lt;9-201006132232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060941" version="1" comment="samba-winbind is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060942" version="1" comment="samba is &lt;3.0.26a-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062916" version="1" comment="kernel-default is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070707" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070708" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070709" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062920" version="1" comment="kernel-smp is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062918" version="1" comment="kernel-source is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062919" version="1" comment="kernel-syms is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062914" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062915" version="1" comment="kernel-debug is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062917" version="1" comment="kernel-sn2 is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062921" version="1" comment="kernel-xen is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062922" version="1" comment="xen-kmp is &lt;3.0.4_2.6.5_7.324-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062923" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062924" version="1" comment="kernel-um is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062925" version="1" comment="kernel-xenpae is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062926" version="1" comment="um-host-install-initrd is &lt;1.0-48.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062927" version="1" comment="um-host-kernel is &lt;2.6.5-7.324" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065746" version="1" comment="kernel-s390x-debug is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065747" version="1" comment="kernel-s390x is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065748" version="1" comment="kernel-source is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065749" version="1" comment="kernel-syms is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065750" version="1" comment="kernel-default is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065751" version="1" comment="kernel-iseries64 is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065752" version="1" comment="kernel-pmac64 is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065753" version="1" comment="kernel-pseries64 is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065754" version="1" comment="kernel-smp is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065755" version="1" comment="kernel-64k-pagesize is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065756" version="1" comment="kernel-debug is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065757" version="1" comment="kernel-sn2 is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065758" version="1" comment="kernel-xen is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065759" version="1" comment="xen-kmp is &lt;3.0.4_2.6.5_7.325-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065760" version="1" comment="kernel-bigsmp is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065761" version="1" comment="kernel-um is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065762" version="1" comment="kernel-xenpae is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065763" version="1" comment="um-host-install-initrd is &lt;1.0-48.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065764" version="1" comment="um-host-kernel is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065765" version="1" comment="kernel-s390-debug is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065766" version="1" comment="kernel-s390 is &lt;2.6.5-7.325" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063354" version="1" comment="freetype2-32bit is &lt;9-201010062114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063355" version="1" comment="freetype2-32bit is &lt;9-201010062116" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063356" version="1" comment="freetype2-64bit is &lt;9-201010062115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063357" version="1" comment="freetype2-devel-32bit is &lt;9-201010062114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063358" version="1" comment="freetype2-devel-32bit is &lt;9-201010062116" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063359" version="1" comment="freetype2-devel-64bit is &lt;9-201010062115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063360" version="1" comment="freetype2-devel is &lt;2.1.7-53.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063361" version="1" comment="freetype2-x86 is &lt;9-201010062114" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063362" version="1" comment="freetype2 is &lt;2.1.7-53.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063194" version="1" comment="libsmbclient-32bit is &lt;9-201009141040" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063195" version="1" comment="libsmbclient-32bit is &lt;9-201009141043" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063196" version="1" comment="libsmbclient-64bit is &lt;9-201009141106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063197" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063198" version="1" comment="libsmbclient is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063199" version="1" comment="samba-32bit is &lt;9-201009141040" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063200" version="1" comment="samba-32bit is &lt;9-201009141043" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063201" version="1" comment="samba-client-32bit is &lt;9-201009141040" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063202" version="1" comment="samba-client-32bit is &lt;9-201009141043" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063203" version="1" comment="samba-client is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063204" version="1" comment="samba-doc is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063205" version="1" comment="samba-pdb is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063206" version="1" comment="samba-python is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063207" version="1" comment="samba-vscan is &lt;0.3.6b-0.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063208" version="1" comment="samba-winbind-32bit is &lt;9-201009141040" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063209" version="1" comment="samba-winbind-32bit is &lt;9-201009141043" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063210" version="1" comment="samba-winbind is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063211" version="1" comment="samba is &lt;3.0.26a-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064560" version="1" comment="clamav is &lt;0.96.4-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066162" version="1" comment="IBMJava5-JRE is &lt;1.5.0_sr12.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066163" version="1" comment="IBMJava5-JRE is &lt;1.5.0_sr12.3-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066164" version="1" comment="IBMJava5-SDK is &lt;1.5.0_sr12.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066165" version="1" comment="IBMJava5-SDK is &lt;1.5.0_sr12.3-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066170" version="1" comment="apache-jakarta-tomcat-connectors is &lt;5.0.19-29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066171" version="1" comment="apache2-jakarta-tomcat-connectors is &lt;5.0.19-29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066172" version="1" comment="jakarta-tomcat-doc is &lt;5.0.19-29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066173" version="1" comment="jakarta-tomcat-examples is &lt;5.0.19-29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066174" version="1" comment="jakarta-tomcat is &lt;5.0.19-29.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067912" version="1" comment="openssl-32bit is &lt;9-201104111436" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067913" version="1" comment="openssl-32bit is &lt;9-201104111441" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067914" version="1" comment="openssl-64bit is &lt;9-201104111445" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067915" version="1" comment="openssl-devel-32bit is &lt;9-201104111436" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067916" version="1" comment="openssl-devel-32bit is &lt;9-201104111441" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067917" version="1" comment="openssl-devel-64bit is &lt;9-201104111445" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067918" version="1" comment="openssl-devel is &lt;0.9.7d-15.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067919" version="1" comment="openssl-doc is &lt;0.9.7d-15.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067920" version="1" comment="openssl-x86 is &lt;9-201104111436" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067921" version="1" comment="openssl is &lt;0.9.7d-15.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065849" version="1" comment="python-xml is &lt;2.3.3-88.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064951" version="1" comment="clamav is &lt;0.96.5-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068389" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.9-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068390" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068391" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.9-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068392" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.9-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066674" version="1" comment="IBMJava5-JRE is &lt;1.5.0_sr12.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066675" version="1" comment="IBMJava5-SDK is &lt;1.5.0_sr12.4-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067922" version="1" comment="libtiff-32bit is &lt;9-201104151522" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067923" version="1" comment="libtiff-32bit is &lt;9-201104151524" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067924" version="1" comment="libtiff-64bit is &lt;9-201104151527" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067925" version="1" comment="libtiff-x86 is &lt;9-201104151522" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067926" version="1" comment="libtiff is &lt;3.6.1-38.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066175" version="1" comment="libtiff-32bit is &lt;9-201102281644" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066176" version="1" comment="libtiff-32bit is &lt;9-201102281646" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066177" version="1" comment="libtiff-64bit is &lt;9-201102281648" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066178" version="1" comment="libtiff-x86 is &lt;9-201102281644" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066179" version="1" comment="libtiff is &lt;3.6.1-38.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068358" version="1" comment="postfix is &lt;2.1.1-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067224" version="1" comment="XFree86-Mesa-32bit is &lt;9-201104080857" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067225" version="1" comment="XFree86-Mesa-32bit is &lt;9-201104080901" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067226" version="1" comment="XFree86-Mesa-64bit is &lt;9-201104080937" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067227" version="1" comment="XFree86-Mesa-devel-32bit is &lt;9-201104080857" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067228" version="1" comment="XFree86-Mesa-devel-32bit is &lt;9-201104080901" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067229" version="1" comment="XFree86-Mesa-devel-64bit is &lt;9-201104080937" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067230" version="1" comment="XFree86-Mesa-devel is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067231" version="1" comment="XFree86-Mesa-x86 is &lt;9-201104080857" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067232" version="1" comment="XFree86-Mesa is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067233" version="1" comment="XFree86-Xnest is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067234" version="1" comment="XFree86-Xprt is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067235" version="1" comment="XFree86-Xvfb is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067236" version="1" comment="XFree86-Xvnc is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067237" version="1" comment="XFree86-devel-32bit is &lt;9-201104080857" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067238" version="1" comment="XFree86-devel-32bit is &lt;9-201104080901" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067239" version="1" comment="XFree86-devel-64bit is &lt;9-201104080937" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067240" version="1" comment="XFree86-devel is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067241" version="1" comment="XFree86-doc is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067242" version="1" comment="XFree86-driver-options is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067243" version="1" comment="XFree86-fonts-100dpi is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067244" version="1" comment="XFree86-fonts-75dpi is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067245" version="1" comment="XFree86-fonts-cyrillic is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067246" version="1" comment="XFree86-fonts-scalable is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067247" version="1" comment="XFree86-fonts-syriac is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067248" version="1" comment="XFree86-libs-32bit is &lt;9-201104080857" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067249" version="1" comment="XFree86-libs-32bit is &lt;9-201104080901" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067250" version="1" comment="XFree86-libs-64bit is &lt;9-201104080937" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067251" version="1" comment="XFree86-libs-x86 is &lt;9-201104080857" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067252" version="1" comment="XFree86-libs is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067253" version="1" comment="XFree86-man is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067254" version="1" comment="XFree86-server-glx is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067255" version="1" comment="XFree86-server is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067256" version="1" comment="XFree86 is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067257" version="1" comment="km_drm is &lt;4.3.99.902-43.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069125" version="1" comment="glibc-32bit is &lt;9-201106161649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069126" version="1" comment="glibc-32bit is &lt;9-201106161950" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069127" version="1" comment="glibc-64bit is &lt;9-201106161725" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069128" version="1" comment="glibc-devel-32bit is &lt;9-201106161606" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069129" version="1" comment="glibc-devel-32bit is &lt;9-201106161649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069130" version="1" comment="glibc-devel-64bit is &lt;9-201106161725" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069131" version="1" comment="glibc-devel is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069132" version="1" comment="glibc-html is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069133" version="1" comment="glibc-i18ndata is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069134" version="1" comment="glibc-info is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069135" version="1" comment="glibc-locale-32bit is &lt;9-201106161606" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069136" version="1" comment="glibc-locale-32bit is &lt;9-201106161649" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069137" version="1" comment="glibc-locale-64bit is &lt;9-201106161725" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069138" version="1" comment="glibc-locale-x86 is &lt;9-201106161606" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069139" version="1" comment="glibc-locale is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069140" version="1" comment="glibc-profile-64bit is &lt;9-201106161725" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069141" version="1" comment="glibc-profile is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069142" version="1" comment="glibc-x86 is &lt;9-201106161950" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069143" version="1" comment="glibc is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069144" version="1" comment="nscd is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069145" version="1" comment="timezone is &lt;2.3.3-98.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070147" version="1" comment="libsmbclient-32bit is &lt;9-201107292007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070148" version="1" comment="libsmbclient-32bit is &lt;9-201107302056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070149" version="1" comment="libsmbclient-64bit is &lt;9-201107300252" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070150" version="1" comment="libsmbclient-devel is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070151" version="1" comment="libsmbclient is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070152" version="1" comment="samba-32bit is &lt;9-201107292007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070153" version="1" comment="samba-32bit is &lt;9-201107302056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070154" version="1" comment="samba-client-32bit is &lt;9-201107292007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070155" version="1" comment="samba-client-32bit is &lt;9-201107302056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070156" version="1" comment="samba-client is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070157" version="1" comment="samba-doc is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070158" version="1" comment="samba-pdb is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070159" version="1" comment="samba-python is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070160" version="1" comment="samba-vscan is &lt;0.3.6b-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070161" version="1" comment="samba-winbind-32bit is &lt;9-201107292007" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070162" version="1" comment="samba-winbind-32bit is &lt;9-201107302056" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070163" version="1" comment="samba-winbind is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070164" version="1" comment="samba is &lt;3.0.26a-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068329" version="1" comment="vsftpd is &lt;2.0.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070094" version="1" comment="IBMJava2-JRE is &lt;1.4.2_sr13.10-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070095" version="1" comment="IBMJava2-SDK is &lt;1.4.2_sr13.10-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069727" version="1" comment="IBMJava5-JRE is &lt;1.5.0_sr12.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069728" version="1" comment="IBMJava5-SDK is &lt;1.5.0_sr12.5-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067004" version="1" comment="dhcp-client is &lt;3.0.1rc13-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067005" version="1" comment="dhcp-devel is &lt;3.0.1rc13-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067006" version="1" comment="dhcp-relay is &lt;3.0.1rc13-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067007" version="1" comment="dhcp-server is &lt;3.0.1rc13-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067008" version="1" comment="dhcp is &lt;3.0.1rc13-28.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067927" version="1" comment="dhcp6 is &lt;0.10-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067009" version="1" comment="dhcpcd is &lt;1.3.22pl4-193.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066954" version="1" comment="dhcpcd is &lt;1.3.22pl4-193.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068719" version="1" comment="ethereal is &lt;0.10.13-2.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069446" version="1" comment="cyrus-imapd-devel is &lt;2.2.3-83.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069447" version="1" comment="cyrus-imapd is &lt;2.2.3-83.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069448" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.3-83.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069449" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.3-83.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069863" version="1" comment="glibc-32bit is &lt;9-201107291757" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069864" version="1" comment="glibc-32bit is &lt;9-201108011005" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069865" version="1" comment="glibc-64bit is &lt;9-201107291812" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069866" version="1" comment="glibc-devel-32bit is &lt;9-201107291651" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069867" version="1" comment="glibc-devel-32bit is &lt;9-201107291757" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069868" version="1" comment="glibc-devel-64bit is &lt;9-201107291812" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069869" version="1" comment="glibc-devel is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069870" version="1" comment="glibc-html is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069871" version="1" comment="glibc-i18ndata is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069872" version="1" comment="glibc-info is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069873" version="1" comment="glibc-locale-32bit is &lt;9-201107291651" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069874" version="1" comment="glibc-locale-32bit is &lt;9-201107291757" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069875" version="1" comment="glibc-locale-64bit is &lt;9-201107291812" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069876" version="1" comment="glibc-locale-x86 is &lt;9-201107291651" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069877" version="1" comment="glibc-locale is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069878" version="1" comment="glibc-profile-64bit is &lt;9-201107291812" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069879" version="1" comment="glibc-profile is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069880" version="1" comment="glibc-x86 is &lt;9-201108011005" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069881" version="1" comment="glibc is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069882" version="1" comment="libxcrypt-32bit is &lt;9-201107291733" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069883" version="1" comment="libxcrypt-32bit is &lt;9-201107292136" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069884" version="1" comment="libxcrypt-64bit is &lt;9-201107292059" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069885" version="1" comment="libxcrypt-devel is &lt;2.1.90-61.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069886" version="1" comment="libxcrypt-x86 is &lt;9-201107291733" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069887" version="1" comment="libxcrypt is &lt;2.1.90-61.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069888" version="1" comment="nscd is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069889" version="1" comment="pam-modules-32bit is &lt;9-201107291830" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069890" version="1" comment="pam-modules-32bit is &lt;9-201107310656" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069891" version="1" comment="pam-modules-64bit is &lt;9-201107300859" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069892" version="1" comment="pam-modules-x86 is &lt;9-201107291830" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069893" version="1" comment="pam-modules is &lt;9-18.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069894" version="1" comment="pwdutils is &lt;2.6.4-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069895" version="1" comment="timezone is &lt;2.3.3-98.123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070710" version="1" comment="foomatic-filters is &lt;3.0.1-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070028" version="1" comment="clamav is &lt;0.97.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039846"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iproute2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ethereal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif21-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-non-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-fax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_dav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>km_drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-smp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64k-pagesize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-sn2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-um</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>um-host-install-initrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>um-host-kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-iseries64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pmac64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pseries64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unarj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iptables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-mod_php4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_php4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_php4-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java2-jre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resmgr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resmgr-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resmgr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>resmgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htdig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-lib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-lib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>horde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpopper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-UUlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredcarpet-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredcarpet-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd-modules-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>red-carpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-jakarta-tomcat-connectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-jakarta-tomcat-connectors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-tomcat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-tomcat-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Compress-Zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat-ldirectord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat-pils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat-stonith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-mpz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-deat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libungif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libungif-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libungif-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libungif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liby2util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liby2util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-recode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IBMJava2-JRE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IBMJava2-SDK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>authldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncompress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsupplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlrpc-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mhash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_php4-apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-domxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-filepro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-mime_magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-qtdom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-swf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-xslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-yp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php4-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xprt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-s390x-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-s390-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-DNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IBMJava5-JRE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IBMJava5-SDK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xenpae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-xmms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heimdal-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-monitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-serv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>timezone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>km_ndiswrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uucp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Mesa-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Mesa-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Mesa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-driver-options</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-fonts-100dpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-fonts-75dpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-fonts-cyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-fonts-scalable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-fonts-syriac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>XFree86-server-glx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>km_drm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">9</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.25-325.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.25-325.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8p1-37.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-866.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412202049</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412202205</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412202113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412202214</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-366.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502051955</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502060348</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502060420</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502051945</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-324.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-806.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504131658</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504132031</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504131529</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-68.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-806.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.3-15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408311758</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408311952</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408312018</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408311747</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-41.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407192204</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407192329</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407211228</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407192328</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407211117</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407211155</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.09-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.3-15.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.18-39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410031617</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410031928</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410031619</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-519.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411100109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411100704</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411100528</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411100318</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410081851</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410082201</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410082105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.30MLI4-119.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409151952</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409161634</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409152030</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409152035</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407271038</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407271118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407271122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200407271036</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408111036</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408111119</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408111051</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-68.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408111026</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408140621</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408162047</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200408140912</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-71.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-74.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14i-547.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-62.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409091658</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409091701</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409091710</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409091646</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-125.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-62.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409161502</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.64-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-67.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410202150</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410212027</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410210007</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410202139</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.4-83.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-377.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.5-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409021137</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409021330</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409021135</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.14-180.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200409021329</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.111.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.18-33.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410081842</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.29-71.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-71.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411082338</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411090434</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411090337</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411082329</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-41.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-74.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.3-106.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.65-131.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-95.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410281810</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410291429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410291649</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200410291421</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.22-65.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-324.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-732.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.111.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411221740</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411221926</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411221819</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.14-180.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200411221914</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501280610</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501281513</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501280648</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501280558</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.3-15.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.3-15.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501242029</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501250047</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501242152</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501242018</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.010-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412172026</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412172350</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412172257</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.9-2.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.5-11.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-68.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1046.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501041713</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501042255</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501041834</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200501041705</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-814.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.111.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412071354</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412071355</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412071401</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200412071353</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.07-48.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.11-1.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-45.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-45.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2c-710.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.16-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-47.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-37.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-25.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.6-402.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.10-83.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2b-621.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2002e-92.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.8-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506061933</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506062151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506062057</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506061918</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.7-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504131636</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502182129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502182158</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502182226</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200502182119</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.18-33.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.155.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-38.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504071809</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504072000</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504071906</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504071757</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-38.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504020902</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504020922</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504020324</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504021401</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.42.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-118.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.201</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-63.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.202.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.202.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504222104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504222208</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504222125</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200504222050</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-324.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.87-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-175.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506050833</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506051044</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506050508</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200506051012</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-346.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-49.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.3-106.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200505110332</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200505110425</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200505110156</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200505110526</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.0-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507121454</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-128.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-117.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-125.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-174.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-52.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.193</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.22pl4-193.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507230921</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507231356</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507230446</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-70.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507231603</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.7p5-117.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200508260256</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200508260820</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200508252329</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200508261518</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:169-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.29-71.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-71.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507042222</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507042327</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507042200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-70.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200507042203</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-80.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-618.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712110029</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712110030</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712110033</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.50.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.8-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.78-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.7-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.75-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-72.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2002e-92.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21e-653.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-54.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200510141947</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200510171254</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200510151954</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200510151354</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200511021858</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200511022315</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200511021922</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200511021845</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.0b1-585.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-62.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-125.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6-61.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.27-0.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.46.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-39.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200510171247</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.87.1-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.8-5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.29-71.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-71.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.49-27.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.46.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.252</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-63.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-618.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04_1.5.4-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200512171950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200512180809</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200512180127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200512180003</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-63.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601130434</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601140751</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601140916</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601130505</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12.11-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.257</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-882.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200602210430</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200602210946</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200602210547</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200602210537</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601210802</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601220116</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601210920</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200601210926</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.90.0.1.1-32.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.276</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606132344</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606140645</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606140026</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606140312</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.8-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.78-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.7-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.75-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.27-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-851.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12.11-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-63.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-851.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.88.1-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.18-33.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.88.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200604240415</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200604240730</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200604240704</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200604240512</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-73.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.4-31.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.13-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200605291910</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200605292202</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200605291954</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200605291842</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610302219</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610310204</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610302306</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610302220</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.90.0.1.1-32.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.64-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-68.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4.7-35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-920.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606211802</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606211826</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606211820</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200606211846</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-35.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.286</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609270654</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609270843</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609270842</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609271104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610132325</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610141314</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610151241</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610140253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6i-64.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200612010114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200612010115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200612010055</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607271200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607272039</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607270723</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607271336</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607282027</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607300148</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607282053</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200607282200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.282</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-63.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.283</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.29-71.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-71.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.29-71.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-71.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.88.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-214.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-136.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611140525</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611142157</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611140852</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611140553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.3-76.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609140529</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609142242</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609140736</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200609141208</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12.11-2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:800.024-429.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-164.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6-61.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610230741</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610231629</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610230717</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610231048</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610241503</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610241633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610241608</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200610241452</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:169-28.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.13-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611152043</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611160118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611151828</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611160110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611171828</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611180315</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611171843</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200611171910</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.9-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-1129.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-1129.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.88.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.25-325.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-67.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-216.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1_m17n_20030308-201.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711150229</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711150230</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711150231</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711270033</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711270035</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711270034</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711192343</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711192344</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711192338</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-109.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701181648</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701181719</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701181729</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-125.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701181805</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1rc13-28.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701262000</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701262020</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701262225</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200701262117</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-57.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704031603</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704031835</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704031815</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704031929</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.17-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704271719</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704271846</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704271746</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704271902</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704052111</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704052143</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704052313</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-44.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704052140</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704210224</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704210455</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704210347</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200704210410</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706090005</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706090144</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706082356</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.6-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-68.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.29-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-63.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200703261518</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200703261521</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200703261528</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200703261519</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.09-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.16-2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.4-31.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705221253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705221349</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705221229</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705221242</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-68.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705252036</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705260110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705252330</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705260247</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705181232</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705181249</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200705181242</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706251715</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706251737</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706251754</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.287.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-118.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.90.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.25-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711060115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711060517</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-55.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706160241</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706182342</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706161829</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200706182333</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.22-65.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.92.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.92.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.3-185.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.2.3-76.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707301359</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707301447</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707301401</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-235.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707091422</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707091633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707091536</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-56.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707091629</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200708071549</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200708071552</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200708071548</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707162050</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707170221</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707162127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200707170258</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.22-65.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.112</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.91.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-49.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.311</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710221437</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710221440</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710221441</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-56.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-569.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-8.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200709191342</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200709191359</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200709191336</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-36.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-35.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-41.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200709251549</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200709251619</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711080439</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711080705</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711080640</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.7-860.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-86.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-324.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.91.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711231828</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711231829</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711240034</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710182357</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710182359</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710190001</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-387.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.19-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801312100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801312226</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802010511</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801101709</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801101710</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801101711</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711080056</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711080236</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031457</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031500</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031513</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031441</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031447</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200710031452</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-41.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-270.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.123</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711060113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711060514</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711231615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711231622</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711231617</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.38-4.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801062003</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801062030</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.94</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041545</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041546</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041544</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:215-59.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200711271522</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111650</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111651</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111655</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111659</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712111705</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1rc3-55.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041729</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041731</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712041730</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.20b-3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.26.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.98.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-53.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.323</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4_2.6.5_7.323-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.312</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712191219</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712191220</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200712191222</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.92-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-118.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802110138</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802110139</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.314</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902271552</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902271558</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902280719</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.10-662.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.07.1rc1-195.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-46.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803201838</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803201848</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803210144</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801211531</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801211534</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200801211546</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.92.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.07.1rc1-195.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-46.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802060128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200802060127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.6-41.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-618.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-83.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803040015</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803040018</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803040013</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200807112021</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805282142</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805282145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805282149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803201535</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200803201536</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-346.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200804151618</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200804151629</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201008251343</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201008251911</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201008251703</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201008251304</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-98.114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805201623</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805201625</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-56.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806171754</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806172350</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806172216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808010009</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808010012</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808010015</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.16-2.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200804172236</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200804172237</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200805201632</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-58.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806161815</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806170342</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200806162314</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200807111457</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200807111506</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200807111454</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.139</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.3-185.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-194.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-194.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808201412</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808201417</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808201414</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.9-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-235.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.3-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808130009</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808130018</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200808130011</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-129.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200809051309</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200809051312</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200809051310</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-42.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.701.0-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811141458</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811141502</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811141456</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.315</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200810021505</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200810021549</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200810021507</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200812030148</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200812030152</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-814.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1p1-11.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811201349</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811201357</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811201351</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811071618</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811071633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811071629</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200811201409</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-103.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.22-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200812011726</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200812011728</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200812011733</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211332</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211340</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211338</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-814.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901131807</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901131814</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901131809</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.22-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.144</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.146</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.9-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.0.4-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.80_seamonkey_1.0.4-11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-43.91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211327</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211334</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901211430</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901202353</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901202355</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906161409</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.1-0.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201108021633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201108021634</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201108021636</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.18-32.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0a-23.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901120116</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901120120</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200901120119</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.316</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902201553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902201554</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-39.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902171045</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902171046</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902251713</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902251715</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200902251712</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-75.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904161449</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904161506</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904161924</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0a-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200903091204</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200903091206</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12-55.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.07.1rc1-195.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-46.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904151544</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904151549</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904151553</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200905141643</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200905141649</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200905141648</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.18-33.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.1.19-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912160015</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912160022</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912160050</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-44.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1rc13-28.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200907291720</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200907291723</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906022330</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906022331</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.317</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.25-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200903241519</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200903241522</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200903241530</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904162346</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904170004</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904170054</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.2-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.321</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4_2.6.5_7.321-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001271537</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001271539</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001271549</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-174.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.1.17-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.322</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4_2.6.5_7.322-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.318</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.7-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.59-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906232031</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906232032</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200906232029</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04_1.5.4-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904061139</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904061900</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200904061620</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071506</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071517</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8_seamonkey_1.1.18-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909091106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909091129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909091107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6i-64.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909081613</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909081614</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-366.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071404</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071409</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071407</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-28.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071403</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200908071408</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-39.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE5-42.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003231321</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003231557</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003232314</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-21.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-83.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04_1.5.4-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201005281006</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201005281010</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201005281008</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-56.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-49.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.319</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200910020932</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200910020934</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200910020935</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.26-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909210011</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909210145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200909210409</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-83.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003291534</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003291538</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003291547</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912011928</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912020056</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912020435</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.6-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr11.2-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr11.2-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200911130941</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200911130943</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200911130948</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.2-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001081624</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001081626</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001081641</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95.7-37.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912070059</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912070100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95.7-37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0a-23.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200910300946</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200910300949</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95.7-37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912011710</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912011711</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-200912011715</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-56.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.3-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.27-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001081716</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001081942</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201001082242</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-618.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.11.4-172.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12.11-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12.11-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.07-225.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-136.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.29-71.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-71.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.5-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003180213</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003180217</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003180220</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.24-4.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201006301103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201006301111</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201006301115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009152108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009152109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009152111</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-346.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201004301253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201004301254</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201004301300</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-174.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.20-108.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201010271353</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003120118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201003120132</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-70.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.25-325.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-26.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201004201452</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201004201540</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201004201543</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201007292356</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201007300002</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201007300007</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.3-32.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009011027</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009011028</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009011033</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-182.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201005251428</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201005251430</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201005251431</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.1-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.7-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201008121257</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201008121259</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201008121302</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201006132231</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201006132232</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201006132237</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.324</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4_2.6.5_7.324-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.5-7.325</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4_2.6.5_7.325-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-48.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201010062114</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201010062116</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201010062115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-53.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009141040</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009141043</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201009141106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.4-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.3-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.3-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.19-29.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104111436</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104111441</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104111445</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7d-15.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-88.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.5-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.4-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104151522</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104151524</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104151527</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201102281644</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201102281646</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201102281648</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.1-38.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104080857</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104080901</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201104080937</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.99.902-43.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201106161649</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201106161950</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201106161725</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201106161606</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-98.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107292007</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107302056</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107300252</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26a-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-0.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.5-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1rc13-28.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10-18.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.22pl4-193.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.22pl4-193.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.13-2.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-83.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107291757</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201108011005</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107291812</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107291651</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.3-98.123</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107291733</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107292136</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107292059</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.90-61.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107291830</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107310656</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-201107300859</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9-18.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.4-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-41.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-1.1</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
